A recently uncovered security flaw within the All In One SEO ecosystem has garnered significant attention within the WordPress community, primarily due to its extensive reach and potential ramifications.
This vulnerability affects the prevalent AIOSEO plugin, which is currently active on over 3 million WordPress websites. Despite its utility, the flaw permits low-privileged users to access a site-wide AI access token associated with the plugin’s AI functionalities.
This emerging issue contributes to an alarming trend of security breaches involving All In One SEO in 2025. Security researchers have disclosed that this marks the sixth vulnerability identified for the plugin this year, intensifying concerns surrounding recurring authorization and permission-related lapses.
All In One SEO and the AIOSEO Plugin in WordPress
The AIOSEO plugin stands as one of the foremost SEO tools in the WordPress ecosystem. It facilitates essential optimization tasks, including metadata generation, XML sitemap creation, structured data inclusion, and enhancement of on-page SEO efficacy.
Recent iterations of All In One SEO have incorporated AI-driven tools meant to assist users in crafting SEO titles, meta descriptions, blog entries, FAQs, social media content, and even image generation.
These AI capabilities depend on a universal AI access token that enables the plugin to interact with external AIOSEO AI services on behalf of the site.
Missing Capability Check in the AIOSEO Plugin
The security flaw was traced back to an absent permission check in a REST API endpoint utilized by the All In One SEO plugin.
According to Wordfence, this issue allowed users with Contributor-level access or higher to obtain sensitive AI-related information.
This particular endpoint was designed to relay information regarding a site’s AI usage and remaining credits.
However, it failed to verify whether the requesting user was authorized to access such data, thereby exposing the site’s global AI access token to low-privilege users.
Why Low-Privilege Access Is a Serious Issue in WordPress
Contributor represents one of the most minimal privilege roles within WordPress. Many websites grant Contributor access to guest authors, freelancers, or editorial personnel so they can submit drafts for evaluation.
By unveiling a site-wide AI token to these users, All In One SEO effectively granted extensive access to a credential that governs AI capabilities across the site. Such a token’s misuse could manifest through various nefarious means.
Potential Risks of the All-in-One SEO Vulnerability
While the vulnerability does not permit direct code execution, it still harbors significant risks:
- Unauthorized AI usage: The exposed token could facilitate unauthorized AI content generation through the affected WordPress site, thereby depleting available credits.
- Service depletion: An attacker might automate AI requests to exhaust the site’s AI quota, hampering administrators’ ability to utilize those features.
- Billing and resource concerns: Even in the absence of direct financial theft, the misuse of AI credits could lead to unexpected expenses or workflow disruptions.
How the AIOSEO Plugin Vulnerability Was Fixed
The vulnerability impacted all versions of All In One SEO up to and including version 4.9.2. Its resolution came with version 4.9.3. In the official plugin changelog, developers articulated the fix as follows:
“Hardened API routes to prevent AI access token from being exposed.”
This adjustment directly rectified the missing permission check identified in the REST API endpoint.
What WordPress Site Owners Should Do Now

All users of All In One SEO on WordPress sites ought to update to version 4.9.3 or newer immediately. Websites that accommodate multiple Contributors or external collaborators face heightened risk, as low-privilege accounts could access the AI token in vulnerable iterations.
Regularly updating WordPress plugins, particularly those like AIOSEO that integrate AI services and external APIs, remains one of the most effective strategies to mitigate exposure to security vulnerabilities.
Source link: Thecyberexpress.com.






