Impact
The AI Feeds plugin for WordPress suffers from an unauthenticated file‑upload flaw exposed through the actualizador_git.php endpoint. Because the code omits a capability check, any visitor can cause the plugin to download arbitrary GitHub repositories and overwrite plugin files on the server. If an attacker replaces a plugin file with malicious code, remote execution is possible. The flaw is a classic example of CWE‑434, an unrestricted upload of a dangerous type.
Affected Systems
All installations of AI Feeds version 1.0.11 and earlier, distributed by soportecibeles, are affected. Any WordPress site that has not upgraded or disabled the plugin is vulnerable, regardless of additional configuration.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity, while the EPSS score of less than 1% points to a low but non‑zero exploitation probability. The vulnerability is not listed in CISA’s KEV catalog, so no widespread exploitation is currently reported. Attackers can exploit the flaw over HTTP without authentication and overwrite plugin files, potentially delivering arbitrary code.
OpenCVE Enrichment