CVE-2024-11896: WP Text Prompter: Stored XSS in OpenAI shortcode plugin
MEDIUM PoC AVAILABLEA WordPress plugin integrating ChatGPT/OpenAI exposes stored XSS exploitable by any contributor-level user — primary risk is OpenAI API key theft and admin session hijacking. Patch immediately to a version above 1.0.7 or disable the plugin entirely. Rotate any OpenAI API keys configured in the plugin and audit all contributor accounts on AI-enabled WordPress sites.
Risk Assessment
Medium severity in isolation, but elevated in AI-integrated environments. Low attack complexity post-authentication makes this trivially exploitable by anyone with contributor access — a low bar in editorial CMS environments. The main AI-specific risk multiplier is the likely presence of OpenAI API keys in the plugin configuration, which if exfiltrated enable unauthorized inference at the victim's cost and expose data sent to the API.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
Update Text Prompter plugin to a version above 1.0.7 immediately via WordPress dashboard.
-
If no patch is available, disable the plugin and purge all text_prompter shortcodes from existing content.
-
Rotate all OpenAI API keys configured in this plugin — treat them as compromised.
-
Audit contributor-level WordPress accounts; restrict to minimum necessary trusted users.
-
Scan pages and posts for unexpected script tags or obfuscated JavaScript injected via shortcodes.
-
Enable WAF rules targeting WordPress shortcode attribute injection patterns.
-
Review OpenAI API usage logs for anomalous activity over the past 90 days.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-11896?
A WordPress plugin integrating ChatGPT/OpenAI exposes stored XSS exploitable by any contributor-level user — primary risk is OpenAI API key theft and admin session hijacking. Patch immediately to a version above 1.0.7 or disable the plugin entirely. Rotate any OpenAI API keys configured in the plugin and audit all contributor accounts on AI-enabled WordPress sites.
Is CVE-2024-11896 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-11896, increasing the risk of exploitation.
How to fix CVE-2024-11896?
1. Update Text Prompter plugin to a version above 1.0.7 immediately via WordPress dashboard. 2. If no patch is available, disable the plugin and purge all text_prompter shortcodes from existing content. 3. Rotate all OpenAI API keys configured in this plugin — treat them as compromised. 4. Audit contributor-level WordPress accounts; restrict to minimum necessary trusted users. 5. Scan pages and posts for unexpected script tags or obfuscated JavaScript injected via shortcodes. 6. Enable WAF rules targeting WordPress shortcode attribute injection patterns. 7. Review OpenAI API usage logs for anomalous activity over the past 90 days.
What systems are affected by CVE-2024-11896?
This vulnerability affects the following AI/ML architecture patterns: WordPress AI plugin integrations, LLM API integrations, CMS-based AI content pipelines.
What is the CVSS score for CVE-2024-11896?
CVE-2024-11896 has a CVSS v3.1 base score of 6.4 (MEDIUM). The EPSS exploitation probability is 0.14%.
Technical Details
NVD Description
The Text Prompter – Unlimited chatgpt text prompts for openai tasks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'text_prompter' shortcode in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Exploitation Scenario
An attacker with contributor access (e.g., via compromised editor credentials or a malicious insider) creates a page embedding a text_prompter shortcode with a malicious onload or event attribute containing JavaScript. The payload is stored server-side. When an administrator previews or visits the page, the script fires in their privileged browser context — exfiltrating session cookies and any API keys visible in the admin interface to an attacker-controlled endpoint. The attacker then uses the stolen OpenAI API key for unauthorized inference, data harvesting, or cost abuse against the victim organization's quota.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N References
Timeline
Related Vulnerabilities
CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Extraction CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Code Execution CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same attack type: Code Execution
AI Threat Alert