The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Coderevolution
Coderevolution aiomatic |
|
CPEs | cpe:2.3:a:coderevolution:aiomatic:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Coderevolution
Coderevolution aiomatic |
Tue, 24 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary. | |
Title | Aiomatic - AI Content Writer, Editor, ChatBot & AI Toolkit <= 2.5.0 - Authenticated (Subscriber+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-24T08:23:55.136Z
Updated: 2025-06-24T13:29:37.447Z
Reserved: 2025-06-17T15:33:44.780Z
Link: CVE-2025-6206

Updated: 2025-06-24T13:29:19.582Z

Status : Analyzed
Published: 2025-06-24T09:15:25.653
Modified: 2025-08-13T13:39:01.753
Link: CVE-2025-6206

No data.