{"id":10321,"date":"2025-07-30T17:33:55","date_gmt":"2025-07-30T17:33:55","guid":{"rendered":"https:\/\/affinite.io\/cs\/?p=10321"},"modified":"2025-07-30T17:44:33","modified_gmt":"2025-07-30T17:44:33","slug":"vazna-zranitelnost-v-pluginu-ai-engine-pro-wordpress","status":"publish","type":"post","link":"https:\/\/affinite.io\/cs\/vazna-zranitelnost-v-pluginu-ai-engine-pro-wordpress\/","title":{"rendered":"V\u00e1\u017en\u00e1 zranitelnost v pluginu AI\u202fEngine pro WordPress"},"content":{"rendered":"\n
V \u010dervenci 2025 bezpe\u010dnostn\u00ed t\u00fdm Wordfence identifikoval z\u00e1va\u017enou zranitelnost typu \u201earbitrary file upload\u201c<\/strong> v pluginu AI\u202fEngine pro WordPress<\/strong>, kter\u00e1 postihuje p\u0159ibli\u017en\u011b 100\u202f000 instalac\u00ed<\/strong>. Tato chyba umo\u017e\u0148ovala \u00fato\u010dn\u00edk\u016fm nahr\u00e1vat libovoln\u00e9 soubory (nap\u0159. PHP) bez p\u0159ihl\u00e1\u0161en\u00ed a m\u016f\u017ee v\u00e9st i k \u00fapln\u00e9mu p\u0159evzet\u00ed kontroly nad webem.<\/p>\n\n\n\n Jedn\u00e1 se o chybu, kdy plugin umo\u017e\u0148uje nahr\u00e1n\u00ed souboru bez validace \u2013 \u00fato\u010dn\u00edk m\u016f\u017ee uploadovat \u0161kodliv\u00fd soubor (nap\u0159. PHP) do serveru, kter\u00fd se n\u00e1sledn\u011b spust\u00ed, co\u017e m\u016f\u017ee v\u00e9st k vzd\u00e1len\u00e9mu spu\u0161t\u011bn\u00ed k\u00f3du (RCE)<\/strong> nebo ovl\u00e1dnut\u00ed cel\u00e9 instalace WordPressu.<\/p>\n\n\n\n Chyba byla opravena ve verzi 2.9.5<\/strong>. V\u0161echny p\u0159edchoz\u00ed verze jsou zraniteln\u00e9.<\/p>\n\n\n\n Pokud na sv\u00e9m webu pou\u017e\u00edv\u00e1te plugin AI\u202fEngine<\/strong>:<\/p>\n\n\n\n Zranitelnost v pluginu AI\u202fEngine umo\u017e\u0148ovala neautorizovan\u00fd upload soubor\u016f a potenci\u00e1ln\u00ed ovl\u00e1dnut\u00ed webu. Byla opravena ve verzi 2.9.5, a v\u0161em u\u017eivatel\u016fm se d\u016frazn\u011b doporu\u010duje okam\u017eit\u00e1 aktualizace. Tento incident op\u011bt ukazuje, jak d\u016fle\u017eit\u00e1 je pravideln\u00e1 \u00fadr\u017eba, bezpe\u010dnostn\u00ed pluginy a kontrola REST API p\u0159\u00edstup\u016f.<\/p>\n\n\n\n Pot\u0159ebujete-li pomoc s kontrolou nebo zabezpe\u010den\u00edm va\u0161eho webu, nev\u00e1hejte m\u011b kontaktovat.<\/p>\n","protected":false},"excerpt":{"rendered":" V \u010dervenci 2025 bezpe\u010dnostn\u00ed t\u00fdm Wordfence identifikoval z\u00e1va\u017enou zranitelnost typu \u201earbitrary file upload\u201c v pluginu AI\u202fEngine pro WordPress, kter\u00e1 postihuje p\u0159ibli\u017en\u011b 100\u202f000 instalac\u00ed. Tato chyba umo\u017e\u0148ovala \u00fato\u010dn\u00edk\u016fm nahr\u00e1vat libovoln\u00e9 soubory (nap\u0159. PHP) bez p\u0159ihl\u00e1\u0161en\u00ed a m\u016f\u017ee v\u00e9st i k \u00fapln\u00e9mu p\u0159evzet\u00ed kontroly nad webem. Popis zranitelnosti 1. Co je arbitrary file upload Jedn\u00e1 se o<\/p>\n","protected":false},"author":1,"featured_media":10323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-10321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezpecnost-wordpressu"],"uagb_featured_image_src":{"full":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability.webp",1536,1024,false],"thumbnail":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability-150x150.webp",150,150,true],"medium":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability-300x200.webp",300,200,true],"medium_large":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability-768x512.webp",640,427,true],"large":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability-1024x683.webp",640,427,true],"1536x1536":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability.webp",1536,1024,false],"2048x2048":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability.webp",1536,1024,false],"archive-list":["https:\/\/affinite.io\/cs\/wp-content\/uploads\/sites\/2\/2025\/07\/plugin-vulnerability-400x265.webp",400,265,true]},"uagb_author_info":{"display_name":"Affinite","author_link":"https:\/\/affinite.io\/cs\/author\/affinite\/"},"uagb_comment_info":0,"uagb_excerpt":"V \u010dervenci 2025 bezpe\u010dnostn\u00ed t\u00fdm Wordfence identifikoval z\u00e1va\u017enou zranitelnost typu \u201earbitrary file upload\u201c v pluginu AI\u202fEngine pro WordPress, kter\u00e1 postihuje p\u0159ibli\u017en\u011b 100\u202f000 instalac\u00ed. Tato chyba umo\u017e\u0148ovala \u00fato\u010dn\u00edk\u016fm nahr\u00e1vat libovoln\u00e9 soubory (nap\u0159. PHP) bez p\u0159ihl\u00e1\u0161en\u00ed a m\u016f\u017ee v\u00e9st i k \u00fapln\u00e9mu p\u0159evzet\u00ed kontroly nad webem. Popis zranitelnosti 1. Co je arbitrary file upload Jedn\u00e1 se o","_links":{"self":[{"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/posts\/10321"}],"collection":[{"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/comments?post=10321"}],"version-history":[{"count":1,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/posts\/10321\/revisions"}],"predecessor-version":[{"id":10322,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/posts\/10321\/revisions\/10322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/media\/10323"}],"wp:attachment":[{"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/media?parent=10321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/categories?post=10321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/affinite.io\/cs\/wp-json\/wp\/v2\/tags?post=10321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Popis zranitelnosti<\/h2>\n\n\n\n
1. Co je arbitrary file upload<\/em><\/h3>\n\n\n\n
2. Konkr\u00e9tn\u00ed mechanismus v pluginu AI\u202fEngine<\/h3>\n\n\n\n
\n
\/mwai-ui\/v1\/files\/upload<\/code>, kde nebyla \u017e\u00e1dn\u00e1 validace typu souboru ani opr\u00e1vn\u011bn\u00ed.<\/li>\n\n\n\n
permission_callback<\/code> byl nastaven na
__return_true<\/code>, tak\u017ee ho mohl volat kdokoliv, i bez p\u0159ihl\u00e1\u0161en\u00ed.<\/li>\n\n\n\n
Dopady a rizika<\/h2>\n\n\n\n
\n
Zranitelnosti shrnut\u00e9 v bodech<\/h2>\n\n\n\n
N\u00e1zev chyby<\/th> Opr\u00e1vn\u011bn\u00ed<\/th> Mo\u017enosti \u00fato\u010dn\u00edka<\/th> Oprava<\/th><\/tr><\/thead> Arbitrary file upload<\/strong><\/td> Bez p\u0159ihl\u00e1\u0161en\u00ed<\/td> Nahr\u00e1n\u00ed PHP\/XSS souboru<\/td> Validace typu souboru<\/td><\/tr> Chyb\u011bj\u00edc\u00ed kontrola opr\u00e1vn\u011bn\u00ed<\/strong><\/td> REST API dostupn\u00e9 v\u0161em<\/td> Vol\u00e1n\u00ed API bez omezen\u00ed<\/td> permission_callback<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n Jak se zranitelnost \u0159e\u0161\u00ed<\/h2>\n\n\n\n
\n
wp-content\/uploads<\/code>.<\/li>\n<\/ul>\n\n\n\n
Doporu\u010den\u00ed pro spr\u00e1vce<\/h2>\n\n\n\n
\n
Z\u00e1v\u011br<\/h2>\n\n\n\n