CVE-2024-0453: WordPress ChatBot: missing authz deletes OpenAI files
HIGHAny subscriber-level WordPress user can delete files from your organization's linked OpenAI account — including fine-tuned models and assistant training data. Patch to 5.3.5+ immediately or disable the plugin. Rotate the OpenAI API key and audit what files were deleted in your OpenAI account dashboard.
Risk Assessment
High risk for organizations using the WordPress AI ChatBot plugin with a connected OpenAI account. Exploitation requires only a subscriber account (trivially obtained on many WordPress sites), no complex attack chains, and the impact extends beyond the WordPress perimeter into the OpenAI account itself. The scope change (CVSS S:C) reflects this cross-boundary blast radius. Not in CISA KEV and no confirmed active exploitation, but the low barrier makes opportunistic abuse realistic.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| wpbot | pip | — | No patch |
Do you use wpbot? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
Patch immediately
Update WordPress AI ChatBot plugin to 5.3.5 or later — the patch adds proper capability checks to openai_file_delete_callback.
-
Rotate OpenAI API key
Treat the existing key as potentially abused; generate a new one with least-privilege scopes (restrict to only needed endpoints).
-
Audit OpenAI account
Review Files API logs in the OpenAI dashboard for unexpected deletions. Restore from backups if fine-tuned models or assistant files are missing.
-
Scope API keys
Going forward, never use a full-access OpenAI API key in WordPress plugins — use scoped keys that only allow required operations.
-
Detection
Monitor OpenAI API key usage via organization audit logs; alert on bulk file deletions from unexpected sources.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-0453?
Any subscriber-level WordPress user can delete files from your organization's linked OpenAI account — including fine-tuned models and assistant training data. Patch to 5.3.5+ immediately or disable the plugin. Rotate the OpenAI API key and audit what files were deleted in your OpenAI account dashboard.
Is CVE-2024-0453 actively exploited?
No confirmed active exploitation of CVE-2024-0453 has been reported, but organizations should still patch proactively.
How to fix CVE-2024-0453?
1. **Patch immediately**: Update WordPress AI ChatBot plugin to 5.3.5 or later — the patch adds proper capability checks to openai_file_delete_callback. 2. **Rotate OpenAI API key**: Treat the existing key as potentially abused; generate a new one with least-privilege scopes (restrict to only needed endpoints). 3. **Audit OpenAI account**: Review Files API logs in the OpenAI dashboard for unexpected deletions. Restore from backups if fine-tuned models or assistant files are missing. 4. **Scope API keys**: Going forward, never use a full-access OpenAI API key in WordPress plugins — use scoped keys that only allow required operations. 5. **Detection**: Monitor OpenAI API key usage via organization audit logs; alert on bulk file deletions from unexpected sources.
What systems are affected by CVE-2024-0453?
This vulnerability affects the following AI/ML architecture patterns: WordPress-integrated LLM deployments, OpenAI Assistants API integrations, Fine-tuned model pipelines, RAG pipelines using OpenAI Files API, Plugin-based AI agent frameworks.
What is the CVSS score for CVE-2024-0453?
CVE-2024-0453 has a CVSS v3.1 base score of 7.7 (HIGH). The EPSS exploitation probability is 0.15%.
Technical Details
NVD Description
The AI ChatBot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the openai_file_delete_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete files from a linked OpenAI account.
Exploitation Scenario
An attacker registers or compromises a subscriber account on a WordPress site using the vulnerable plugin. They then send a crafted authenticated HTTP request to the openai_file_delete_callback endpoint, passing a target OpenAI file_id. Because no capability check validates that the user should have administrative rights over the OpenAI integration, the request is processed and the file is permanently deleted from the organization's OpenAI account. A targeted attacker could enumerate and delete all files — destroying custom assistant knowledge bases, fine-tuned model training data, and RAG document stores — potentially taking down AI-powered features organization-wide. The entire attack requires only a valid subscriber session cookie and knowledge of the endpoint.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N References
Timeline
Related Vulnerabilities
CVE-2024-0452 7.7 WordPress AI ChatBot: auth bypass enables OpenAI file upload
Same package: wpbot CVE-2023-1651 5.4 AI ChatBot WP: auth bypass exposes OpenAI config + XSS
Same package: wpbot CVE-2024-0451 5.0 wpbot: missing auth exposes OpenAI account files
Same package: wpbot CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction
AI Threat Alert