CVE-2025-5018: Hive Support WP: OpenAI key theft + prompt hijack
HIGHAny subscriber-level user on your WordPress site running Hive Support ≤1.2.4 can steal your OpenAI API key or rewrite your AI chatbot's system prompts. Rotate your OpenAI API key immediately and update the plugin. If patching is delayed, disable the plugin entirely—your AI chat is a live attack surface.
Risk Assessment
High risk for WordPress deployments with registered users (forums, membership sites, SaaS). The barrier to exploitation is extremely low: a $0 account registration is sufficient. OpenAI API key exposure creates dual impact—financial (unauthorized API spend) and operational (adversary controls AI behavior). CVSS 7.1 is conservative; the AI-specific impact (prompt manipulation at scale) elevates real-world severity for AI-reliant businesses.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Update Hive Support plugin to version >1.2.4 immediately via WordPress admin.
-
ROTATE
Invalidate and regenerate all OpenAI API keys used by this plugin—assume compromise.
-
RESTRICT
Set spending limits on OpenAI API keys via the OpenAI dashboard to cap financial damage from stolen keys.
-
DISABLE
If patch unavailable, deactivate the plugin until patched.
-
AUDIT
Review OpenAI API usage logs for anomalous calls or spikes indicating key abuse.
-
MONITOR
Check AI chat logs for prompt modifications or unexpected behavior changes.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-5018?
Any subscriber-level user on your WordPress site running Hive Support ≤1.2.4 can steal your OpenAI API key or rewrite your AI chatbot's system prompts. Rotate your OpenAI API key immediately and update the plugin. If patching is delayed, disable the plugin entirely—your AI chat is a live attack surface.
Is CVE-2025-5018 actively exploited?
No confirmed active exploitation of CVE-2025-5018 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-5018?
1. PATCH: Update Hive Support plugin to version >1.2.4 immediately via WordPress admin. 2. ROTATE: Invalidate and regenerate all OpenAI API keys used by this plugin—assume compromise. 3. RESTRICT: Set spending limits on OpenAI API keys via the OpenAI dashboard to cap financial damage from stolen keys. 4. DISABLE: If patch unavailable, deactivate the plugin until patched. 5. AUDIT: Review OpenAI API usage logs for anomalous calls or spikes indicating key abuse. 6. MONITOR: Check AI chat logs for prompt modifications or unexpected behavior changes.
What systems are affected by CVE-2025-5018?
This vulnerability affects the following AI/ML architecture patterns: WordPress AI chatbot integrations, LLM API key storage in plugins, Customer-facing AI chat systems, OpenAI-backed support automation.
What is the CVSS score for CVE-2025-5018?
CVE-2025-5018 has a CVSS v3.1 base score of 7.1 (HIGH). The EPSS exploitation probability is 0.21%.
Technical Details
NVD Description
The Hive Support plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the hs_update_ai_chat_settings() and hive_lite_support_get_all_binbox() functions in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and overwrite the site’s OpenAI API key and inspection data or modify AI-chat prompts and behavior. This vulnerability is potentially a duplicate of CVE-2025-32208 or/and CVE-2025-32242.
Exploitation Scenario
An attacker registers a free subscriber account on a WordPress site. They send an authenticated AJAX POST to wp-admin/admin-ajax.php calling hs_update_ai_chat_settings() with a crafted payload—no capability check blocks them. First, they call hive_lite_support_get_all_binbox() to read and exfiltrate the stored OpenAI API key, then sell it or use it for their own LLM workloads at the victim's expense. Simultaneously, they inject a malicious system prompt instructing the chatbot to collect visitor PII, redirect users to phishing pages, or deny support to legitimate users—all while appearing as the legitimate company AI assistant.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N References
Timeline
Related Vulnerabilities
CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Extraction CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction GHSA-vvpj-8cmc-gx39 10.0 picklescan: security flaw enables exploitation
Same attack type: Auth Bypass
AI Threat Alert