Description
The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.
Published: 2025-11-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Loss
Action: Patch Now
AI Analysis

Impact

The Alt Text Generator AI plugin for WordPress contains a missing capability check on the atgai_delete_api_key() function. This flaw allows any authenticated user with Subscriber-level access or higher to delete the API key associated with the site. Removing the key disables the plugin’s AI assistance, causing a loss of service functionality and potentially exposing underlying data if the key was used for sensitive operations. The weakness is classified as CWE-862, a missing authorization vulnerability.

Affected Systems

The vulnerability affects the WebToffee Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images WordPress plugin. All releases up to, and including, 1.8.3 are impacted. The affected product is the plugin itself, and any WordPress installations that have this plugin installed at an affected version.

Risk and Exploitability

The CVSS v3.1 base score for this flaw is 4.3, indicating a medium risk from a technical standpoint. However, the EPSS score is below 1%, implying a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Because the flaw requires that the attacker be authenticated with at least Subscriber-level privileges, the attack vector is internal. A legitimate subscriber could trigger the deletion endpoint to invalidate the AI key, disrupting workflow or potentially exposing private data if the key is used to interface with external services. The overall risk remains moderate due to the need for valid credentials and the low exploitation likelihood.

Generated by OpenCVE AI on April 22, 2026 at 11:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Alt Text Generator AI plugin to the latest version (>=1.8.4) where the missing capability check has been added.
  • If an upgrade is not immediately possible, revoke or regenerate the AI API key via the WordPress admin to prevent use of the existing key and monitor for further deletions.
  • Restrict Subscriber or higher roles from accessing the atgai_delete_api_key endpoint by adjusting role capabilities or using a role‑based access control plugin.

Generated by OpenCVE AI on April 22, 2026 at 11:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 14 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 12 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the atgai_delete_api_key() function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the API key connected to the site.
Title Alt Text Generator AI – Auto Generate & Bulk Update Alt Texts For Images <= 1.8.3 - Missing Authorization to Authenticated (Subscriber+) API Key Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:57.141Z

Reserved: 2025-10-23T15:16:28.940Z

Link: CVE-2025-12113

cve-icon Vulnrichment

Updated: 2025-11-12T14:20:56.109Z

cve-icon NVD

Status : Deferred

Published: 2025-11-12T08:15:40.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:00:05Z

Weaknesses