Description
The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Published: 2026-03-20
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an arbitrary function call flaw in the Aimogen Pro WordPress plugin caused by a missing capability check on the function 'aiomatic_call_ai_function_realtime'. Because the plugin does not verify that the caller holds appropriate permissions, unauthenticated attackers can invoke any WordPress function, such as 'update_option', to modify site configuration. This flaw is classified as CWE-862 (Missing Authorization). As a result, attackers can raise the default user registration role to 'Administrator' and enable user registration, enabling them to create a new admin account and gain full administrative control of the site.

Affected Systems

All WordPress sites that have installed the CodeRevolution Aimogen Pro plugin, specifically versions up to and including 2.7.5, are affected. The vulnerability is exploitable from any external network without needing pre‑existing credentials, making the risk broad and immediate. The plugin is available for download via the CodeCanyon marketplace and is actively used in many content‑generation workflows.

Risk and Exploitability

The CVSS score of 9.8 denotes a critical severity level, and although EPSS data is not available, the absence of the vulnerability from the CISA KEV catalog does not diminish the risk. Exploitation requires only a crafted HTTP request to the vulnerable endpoint; no additional software or privileged access is needed. If an attacker is able to exploit the flaw, they can achieve full administrative privileges, providing complete confidentiality, integrity and availability compromise of the affected WordPress instance.

Generated by OpenCVE AI on March 20, 2026 at 05:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Aimogen Pro to any version newer than 2.7.5.
  • If no newer version is available, temporarily deactivate or uninstall the Aimogen Pro plugin to remove the vulnerability.
  • Verify that future updates include proper capability checks on 'aiomatic_call_ai_function_realtime' or related functions.

Generated by OpenCVE AI on March 20, 2026 at 05:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Coderevolution
Coderevolution aimogen Pro - All-in-one Ai Content Writer, Editor, Chatbot & Automation Toolkit
Wordpress
Wordpress wordpress
Vendors & Products Coderevolution
Coderevolution aimogen Pro - All-in-one Ai Content Writer, Editor, Chatbot & Automation Toolkit
Wordpress
Wordpress wordpress

Fri, 20 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Description The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Title Aimogen Pro <= 2.7.5 - Unauthenticated Privilege Escalation via Arbitrary Function Call
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Coderevolution Aimogen Pro - All-in-one Ai Content Writer, Editor, Chatbot & Automation Toolkit
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:49.699Z

Reserved: 2026-03-12T06:33:24.393Z

Link: CVE-2026-4038

cve-icon Vulnrichment

Updated: 2026-03-20T14:28:43.159Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T04:16:50.300

Modified: 2026-03-20T13:37:50.737

Link: CVE-2026-4038

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:37:30Z

Weaknesses