CVE-2024-6845: ChatGPT WP Plugin: OpenAI API key leak via unauth REST
MEDIUM PoC AVAILABLE NUCLEI TEMPLATE CISA: TRACK*Any WordPress site running 'Chatbot with ChatGPT' before v2.4.6 is leaking its OpenAI API key to unauthenticated attackers — the encoding is trivially reversible. Update to 2.4.6+ immediately and rotate the API key, treating it as fully compromised. Monitor OpenAI API usage logs for anomalous spend or unauthorized requests before and after patching.
Risk Assessment
CVSS 5.3 understates operational risk. The attack is zero-friction: no authentication, no user interaction, network-accessible, low complexity. The leaked API key enables financial harm via API cost abuse, unauthorized access to AI-generated content at the victim's expense, and potential exposure of conversation history. WordPress plugins with embedded AI credentials represent a rapidly growing and poorly-audited attack surface for LLM API key theft.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| chatbot_with_chatgpt | — | — | No patch |
Do you use chatbot_with_chatgpt? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Update plugin to v2.4.6+ immediately — this is the only full remediation.
-
Rotate the OpenAI API key unconditionally — treat as compromised regardless of observed exploitation.
-
Set API spend limits and budget alerts in the OpenAI dashboard to cap financial exposure.
-
Audit OpenAI API usage logs for the period the vulnerable plugin was active.
-
Scan all WordPress instances in the environment for this plugin version via WPScan or equivalent.
-
Establish a policy requiring security review before deploying plugins that store third-party AI API credentials.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Related AI Incidents (1)
Source: AI Incident Database (AIID)
Frequently Asked Questions
What is CVE-2024-6845?
Any WordPress site running 'Chatbot with ChatGPT' before v2.4.6 is leaking its OpenAI API key to unauthenticated attackers — the encoding is trivially reversible. Update to 2.4.6+ immediately and rotate the API key, treating it as fully compromised. Monitor OpenAI API usage logs for anomalous spend or unauthorized requests before and after patching.
Is CVE-2024-6845 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-6845, increasing the risk of exploitation.
How to fix CVE-2024-6845?
1. Update plugin to v2.4.6+ immediately — this is the only full remediation. 2. Rotate the OpenAI API key unconditionally — treat as compromised regardless of observed exploitation. 3. Set API spend limits and budget alerts in the OpenAI dashboard to cap financial exposure. 4. Audit OpenAI API usage logs for the period the vulnerable plugin was active. 5. Scan all WordPress instances in the environment for this plugin version via WPScan or equivalent. 6. Establish a policy requiring security review before deploying plugins that store third-party AI API credentials.
What systems are affected by CVE-2024-6845?
This vulnerability affects the following AI/ML architecture patterns: WordPress AI chatbot deployments, LLM API integrations, plugin-based AI implementations, SaaS-embedded AI features via third-party plugins.
What is the CVSS score for CVE-2024-6845?
CVE-2024-6845 has a CVSS v3.1 base score of 5.3 (MEDIUM). The EPSS exploitation probability is 21.60%.
Technical Details
NVD Description
The Chatbot with ChatGPT WordPress plugin before 2.4.6 does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key
Exploitation Scenario
An attacker enumerates WordPress sites via WPScan, Shodan, or targeted Google dorking, identifying installations running the vulnerable plugin version. They call the exposed REST endpoint without credentials, receive the encoded OpenAI API key in the HTTP response, and decode it in seconds (trivial encoding such as base64). With valid OpenAI credentials in hand, the attacker runs unlimited API queries at the victim's expense, probes for stored conversation data, or lists the key on underground markets. No AI or ML knowledge is required — this is a standard web exploitation path accessible to commodity threat actors.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N References
Timeline
Scanner Template Available
A Nuclei vulnerability scanner template exists for this CVE. You can scan your infrastructure for this vulnerability immediately.
View template on GitHubnuclei -t http/cves/2024/CVE-2024-6845.yaml -u https://target.example.com Related Vulnerabilities
CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Extraction CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction GHSA-vvpj-8cmc-gx39 10.0 picklescan: security flaw enables exploitation
Same attack type: Auth Bypass
AI Threat Alert