The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS when appended to critical files such as wp-config.php.
References
Configurations
Configuration 1 (hide)
|
History
12 May 2025, 15:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Quantumcloud wpbot
|
|
CPE | cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:* |
cpe:2.3:a:quantumcloud:wpbot:*:*:*:*:*:wordpress:*:* cpe:2.3:a:quantumcloud:wpbot:4.9.2:*:*:*:*:wordpress:*:* |
Information
Published : 2023-10-19 06:15
Updated : 2025-05-12 15:09
NVD link : CVE-2023-5241
Mitre link : CVE-2023-5241
CVE.ORG link : CVE-2023-5241
JSON object : View
Products Affected
quantumcloud
- wpbot
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')