Impact
The vulnerable plugin allows authenticated users with Contributor or higher privileges to read arbitrary files on the server. This is achieved through inadequate validation of file paths in the AJAX endpoint and the unwarranted usage of file_get_contents() with unbounded URLs, exposing sensitive data such as configuration files or credentials.
Affected Systems
Liquid Themes’ AI Engine for WordPress: ChatGPT, GPT Content Generator plugin, versions up to and including 1.0.1, deployed on WordPress sites.
Risk and Exploitability
The flaw has a CVSS score of 6.5, indicating moderate severity, but the EPSS score is below 1% and it is not listed in the CISA KEV catalog, suggesting low exploitation likelihood. An attacker must be able to authenticate at Contributor level or higher, after which they can exploit the plugin to retrieve any file accessible to the web server.
OpenCVE Enrichment