Description
The AI ChatBot with ChatGPT and Content Generator by AYS plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.0 via the ays_chatgpt_pinecone_upsert function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Published: 2025-11-27
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Server-Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

The AI ChatBot with ChatGPT and Content Generator by AYS exposes a Server‑Side Request Forgery vulnerability in all versions through the ays_chatgpt_pinecone_upsert function. An unauthenticated attacker can supply a crafted pinecone_url value and force the plugin to send HTTP requests from the WordPress host to arbitrary internal or external destinations. This enables the attacker to read or modify information on internal services, potentially exposing sensitive data or executing further attacks against resident infrastructure.

Affected Systems

The vulnerability affects the WordPress plugin AI ChatBot with ChatGPT and Content Generator by AYS in versions 2.7.0 and earlier. No other products or vendors are listed as affected.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, and the EPSS score of less than 1 % reflects a very low probability of exploitation in the wild. The vulnerability is currently not included in the CISA KEV catalog, suggesting no known active exploitation. Based on the description, the likely attack vector is a remote attacker exploiting the plugin’s REST endpoint as an unauthenticated user; the exploit requires only basic HTTP requests and does not depend on privileged access. Detection would involve monitoring outbound traffic originating from the WordPress host to unknown destinations.

Generated by OpenCVE AI on April 22, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the AI ChatBot plugin to version 2.7.1 or later, which contains the SSRF fix.
  • Restrict access to the administrative endpoints that trigger the Pinecone upsert operation so that only authenticated administrators can invoke them.
  • Deploy a web‑application firewall or network firewall rule that blocks the WordPress host from making outbound HTTP(s) requests to internal IP ranges or suspected sensitive hosts, thereby preventing successful SSRF traffic.

Generated by OpenCVE AI on April 22, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 03 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Ays-pro
Ays-pro ai Chatbot With Chatgpt
Wordpress
Wordpress wordpress
Vendors & Products Ays-pro
Ays-pro ai Chatbot With Chatgpt
Wordpress
Wordpress wordpress

Thu, 27 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description The AI ChatBot with ChatGPT and Content Generator by AYS plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.0 via the ays_chatgpt_pinecone_upsert function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Title AI ChatBot with ChatGPT and Content Generator by AYS <= 2.7.0 - Unauthenticated Server-Side Request Forgery via 'pinecone_url' Parameter
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Ays-pro Ai Chatbot With Chatgpt
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:17.117Z

Reserved: 2025-11-18T19:56:37.440Z

Link: CVE-2025-13378

cve-icon Vulnrichment

Updated: 2025-12-03T17:08:50.603Z

cve-icon NVD

Status : Deferred

Published: 2025-11-27T10:15:50.993

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13378

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:30:22Z

Weaknesses