CVE-2024-11896: WP Text Prompter: Stored XSS in OpenAI shortcode plugin

MEDIUM PoC AVAILABLE
Published December 24, 2024
CISO Take

A WordPress plugin integrating ChatGPT/OpenAI exposes stored XSS exploitable by any contributor-level user — primary risk is OpenAI API key theft and admin session hijacking. Patch immediately to a version above 1.0.7 or disable the plugin entirely. Rotate any OpenAI API keys configured in the plugin and audit all contributor accounts on AI-enabled WordPress sites.

Risk Assessment

Medium severity in isolation, but elevated in AI-integrated environments. Low attack complexity post-authentication makes this trivially exploitable by anyone with contributor access — a low bar in editorial CMS environments. The main AI-specific risk multiplier is the likely presence of OpenAI API keys in the plugin configuration, which if exfiltrated enable unauthorized inference at the victim's cost and expose data sent to the API.

Severity & Risk

CVSS 3.1
6.4 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 34% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
Public PoC indexed (trickest/cve)
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Changed
C Low
I Low
A None

Recommended Action

7 steps
  1. Update Text Prompter plugin to a version above 1.0.7 immediately via WordPress dashboard.

  2. If no patch is available, disable the plugin and purge all text_prompter shortcodes from existing content.

  3. Rotate all OpenAI API keys configured in this plugin — treat them as compromised.

  4. Audit contributor-level WordPress accounts; restrict to minimum necessary trusted users.

  5. Scan pages and posts for unexpected script tags or obfuscated JavaScript injected via shortcodes.

  6. Enable WAF rules targeting WordPress shortcode attribute injection patterns.

  7. Review OpenAI API usage logs for anomalous activity over the past 90 days.

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable No
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

ISO 42001
A.6.2.5 - AI System Security and Privacy Controls
NIST AI RMF
MANAGE-2.2 - Treatment of Identified AI Risks
OWASP LLM Top 10
LLM02 - Insecure Output Handling LLM07 - Insecure Plugin Design

Frequently Asked Questions

What is CVE-2024-11896?

A WordPress plugin integrating ChatGPT/OpenAI exposes stored XSS exploitable by any contributor-level user — primary risk is OpenAI API key theft and admin session hijacking. Patch immediately to a version above 1.0.7 or disable the plugin entirely. Rotate any OpenAI API keys configured in the plugin and audit all contributor accounts on AI-enabled WordPress sites.

Is CVE-2024-11896 actively exploited?

Proof-of-concept exploit code is publicly available for CVE-2024-11896, increasing the risk of exploitation.

How to fix CVE-2024-11896?

1. Update Text Prompter plugin to a version above 1.0.7 immediately via WordPress dashboard. 2. If no patch is available, disable the plugin and purge all text_prompter shortcodes from existing content. 3. Rotate all OpenAI API keys configured in this plugin — treat them as compromised. 4. Audit contributor-level WordPress accounts; restrict to minimum necessary trusted users. 5. Scan pages and posts for unexpected script tags or obfuscated JavaScript injected via shortcodes. 6. Enable WAF rules targeting WordPress shortcode attribute injection patterns. 7. Review OpenAI API usage logs for anomalous activity over the past 90 days.

What systems are affected by CVE-2024-11896?

This vulnerability affects the following AI/ML architecture patterns: WordPress AI plugin integrations, LLM API integrations, CMS-based AI content pipelines.

What is the CVSS score for CVE-2024-11896?

CVE-2024-11896 has a CVSS v3.1 base score of 6.4 (MEDIUM). The EPSS exploitation probability is 0.14%.

Technical Details

NVD Description

The Text Prompter – Unlimited chatgpt text prompts for openai tasks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'text_prompter' shortcode in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Exploitation Scenario

An attacker with contributor access (e.g., via compromised editor credentials or a malicious insider) creates a page embedding a text_prompter shortcode with a malicious onload or event attribute containing JavaScript. The payload is stored server-side. When an administrator previews or visits the page, the script fires in their privileged browser context — exfiltrating session cookies and any API keys visible in the admin interface to an attacker-controlled endpoint. The attacker then uses the stolen OpenAI API key for unauthorized inference, data harvesting, or cost abuse against the victim organization's quota.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Timeline

Published
December 24, 2024
Last Modified
December 24, 2024
First Seen
December 24, 2024

Related Vulnerabilities