The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary.
References
Configurations
History
13 Aug 2025, 13:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:coderevolution:aiomatic:*:*:*:*:*:wordpress:*:* | |
First Time |
Coderevolution aiomatic
Coderevolution |
|
References | () https://codecanyon.net/item/aiomatic-automatic-ai-content-writer/38877369#item-description__changelog - Release Notes | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8e0ff2d6-65d2-4a54-b3e5-64b424013313?source=cve - Third Party Advisory |
26 Jun 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Jun 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 09:15
Updated : 2025-08-13 13:39
NVD link : CVE-2025-6206
Mitre link : CVE-2025-6206
CVE.ORG link : CVE-2025-6206
JSON object : View
Products Affected
coderevolution
- aiomatic
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type