CVE-2025-10901

MEDIUM
2025-10-24 [email protected]
4.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 18:38 vuln.today
CVE Published
Oct 24, 2025 - 09:15 nvd
MEDIUM 4.3

DescriptionNVD

The Originality.ai AI Checker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ai_get_table' function in all versions up to, and including, 1.0.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read all data in the wp_originalityai_log database table, which can include post titles, scan scores, credits used, and other data.

AnalysisAI

Originality.ai AI Checker WordPress plugin versions up to 1.0.16 allow authenticated Subscriber-level users to read sensitive data from the wp_originalityai_log database table due to missing capability checks on the 'ai_get_table' AJAX function. An attacker with basic WordPress account privileges can access post titles, scan scores, credit usage, and other logged information without authorization. No public exploit code or active exploitation has been confirmed at time of analysis.

Technical ContextAI

The vulnerability exists in the Originality.ai AI Checker WordPress plugin's AJAX handler function 'ai_get_table', which fails to implement WordPress capability checks before returning database query results. WordPress plugins must verify user permissions using functions like current_user_can() before processing sensitive operations; this plugin omits that check entirely. The affected code is in OriginalityAILogger.php at line 202. The root cause is classified as CWE-862 (Missing Authorization), a common WordPress plugin vulnerability pattern where AJAX endpoints are accessible to any authenticated user regardless of role. The wp_originalityai_log table stores usage logs including post metadata and API credits, making unauthorized access a data exposure risk.

Affected ProductsAI

The Originality.ai AI Checker WordPress plugin is vulnerable in all versions up to and including 1.0.16. The affected WordPress plugin can be identified via CPE reference wordpress_plugin_originality.ai_ai_checker. Users running version 1.0.16 or earlier are at risk. For full details, refer to the Wordfence vulnerability report at https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf94803-1ddf-4b9b-9624-497db455aab2?source=cve and the plugin repository at https://plugins.trac.wordpress.org/browser/originality-ai/trunk/OriginalityAILogger.php#L202.

RemediationAI

Update the Originality.ai AI Checker plugin to version 1.0.17 or later, which includes the missing capability checks on the 'ai_get_table' AJAX function. Users should immediately upgrade via the WordPress plugins dashboard. As an interim workaround pending an update, site administrators can restrict Subscriber-level access or disable user registration to limit potential attackers, though these measures do not fully mitigate the vulnerability. Verify the patch has been applied by confirming the plugin version in Settings > Plugins and reviewing the OriginalityAILogger.php file for proper WordPress capability verification calls (e.g., current_user_can('edit_posts')).

Share

CVE-2025-10901 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy