CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2DescriptionNVD
The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ai_get_table' function in all versions up to, and including, 1.0.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.
AnalysisAI
Originality.ai AI Checker WordPress plugin versions up to 1.0.16 allow authenticated Subscriber-level users to read sensitive data from the wp_originalityai_log database table due to missing capability checks on the 'ai_get_table' AJAX function. An attacker with basic WordPress account privileges can access post titles, scan scores, credit usage, and other logged information without authorization. No public exploit code or active exploitation has been confirmed at time of analysis.
Technical ContextAI
The vulnerability exists in the Originality.ai AI Checker WordPress plugin's AJAX handler function 'ai_get_table', which fails to implement WordPress capability checks before returning database query results. WordPress plugins must verify user permissions using functions like current_user_can() before processing sensitive operations; this plugin omits that check entirely. The affected code is in OriginalityAILogger.php at line 202. The root cause is classified as CWE-862 (Missing Authorization), a common WordPress plugin vulnerability pattern where AJAX endpoints are accessible to any authenticated user regardless of role. The wp_originalityai_log table stores usage logs including post metadata and API credits, making unauthorized access a data exposure risk.
Affected ProductsAI
The Originality.ai AI Checker WordPress plugin is vulnerable in all versions up to and including 1.0.16. The affected WordPress plugin can be identified via CPE reference wordpress_plugin_originality.ai_ai_checker. Users running version 1.0.16 or earlier are at risk. For full details, refer to the Wordfence vulnerability report at https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf94803-1ddf-4b9b-9624-497db455aab2?source=cve and the plugin repository at https://plugins.trac.wordpress.org/browser/originality-ai/trunk/OriginalityAILogger.php#L202.
RemediationAI
Update the Originality.ai AI Checker plugin to version 1.0.17 or later, which includes the missing capability checks on the 'ai_get_table' AJAX function. Users should immediately upgrade via the WordPress plugins dashboard. As an interim workaround pending an update, site administrators can restrict Subscriber-level access or disable user registration to limit potential attackers, though these measures do not fully mitigate the vulnerability. Verify the patch has been applied by confirming the plugin version in Settings > Plugins and reviewing the OriginalityAILogger.php file for proper WordPress capability verification calls (e.g., current_user_can('edit_posts')).
Share
External POC / Exploit Code
Leaving vuln.today