The AI Engine for WordPress: ChatGPT, GPT Content Generator plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.0.1. This is due to insufficient validation of user-supplied file paths in the 'lqdai_update_post' AJAX endpoint and the use of file_get_contents() with user-controlled URLs without protocol restrictions in the insert_image() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
References
Configurations
No configuration.
History
25 Nov 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-25 08:15
Updated : 2025-11-25 22:16
NVD link : CVE-2025-13380
Mitre link : CVE-2025-13380
CVE.ORG link : CVE-2025-13380
JSON object : View
Products Affected
No product.
CWE
CWE-73
External Control of File Name or Path
