The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary.
History

Wed, 13 Aug 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Coderevolution
Coderevolution aiomatic
CPEs cpe:2.3:a:coderevolution:aiomatic:*:*:*:*:*:wordpress:*:*
Vendors & Products Coderevolution
Coderevolution aiomatic

Tue, 24 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary.
Title Aiomatic - AI Content Writer, Editor, ChatBot & AI Toolkit <= 2.5.0 - Authenticated (Subscriber+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-06-24T08:23:55.136Z

Updated: 2025-06-24T13:29:37.447Z

Reserved: 2025-06-17T15:33:44.780Z

Link: CVE-2025-6206

cve-icon Vulnrichment

Updated: 2025-06-24T13:29:19.582Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-24T09:15:25.653

Modified: 2025-08-13T13:39:01.753

Link: CVE-2025-6206

cve-icon Redhat

No data.