Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total17
Critical1
High7
Medium9
Reset
Showing 1-17 of 17 records
Threat Entry Updated 2026-04-15

CVE-2026-1400 - Ai Engine Plugin

The AI Engine – The Chatbot and AI Framework for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `rest_helpers_update_media_metadata` function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The attacker can upload a benign image file, then use the `update_media_metadata` endpoint to rename it to a PHP file, creating an executable PHP…

PLUGIN Ai Engine

CVE-2026-1400

HIGH CVSS 7.2 2026-01-28
Threat Entry Updated 2026-04-15

CVE-2026-0746 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.3.2 via the 'get_audio' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services, if "Public API" is enabled in the plugin settings, and 'allow_url_fopen' is set to 'On' on the server.

PLUGIN Ai Engine

CVE-2026-0746

MEDIUM CVSS 6.4 2026-01-27
Threat Entry Updated 2025-11-19

CVE-2025-8084 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.8 via the rest_helpers_create_images function. This makes it possible for authenticated attackers, with Editor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. On Cloud instances, this issue allows for metadata retrieving.

PLUGIN Ai Engine

CVE-2025-8084

MEDIUM CVSS 6.8 2025-11-18
Threat Entry Updated 2025-11-14

CVE-2025-12844 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to PHP Object Injection via PHAR Deserialization in all versions up to, and including, 3.1.8 via deserialization of untrusted input in the 'rest_simpleTranscribeAudio' and 'rest_simpleVisionQuery' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an…

PLUGIN Ai Engine

CVE-2025-12844

HIGH CVSS 7.1 2025-11-13
Threat Entry Updated 2025-11-06

CVE-2025-11749 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.

PLUGIN Ai Engine

CVE-2025-11749

CRITICAL CVSS 9.8 2025-11-05
Threat Entry Updated 2025-09-04

CVE-2025-8268 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to unauthorized access and loss of data due to a missing capability check on the rest_list and delete_files functions in all versions up to, and including, 2.9.5. This makes it possible for unauthenticated attackers to list and delete files uploaded by other users.

PLUGIN Ai Engine

CVE-2025-8268

MEDIUM CVSS 6.5 2025-09-03
Threat Entry Updated 2025-07-31

CVE-2025-7847 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the rest_simpleFileUpload() function in versions 2.9.3 and 2.9.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server when the REST API is enabled, which may make remote code execution possible.

PLUGIN Ai Engine

CVE-2025-7847

HIGH CVSS 8.8 2025-07-31
Threat Entry Updated 2025-07-25

CVE-2025-7780 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4. The simpleTranscribeAudio endpoint fails to restrict URL schemes before calling get_audio(). This makes it possible for authenticated attackers, with Subscriber-level access and above, to read any file on the web server and exfiltrate it via the plugin’s OpenAI API integration.

PLUGIN Ai Engine

CVE-2025-7780

MEDIUM CVSS 6.5 2025-07-24
Threat Entry Updated 2025-08-13

CVE-2025-5570 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ai Engine

CVE-2025-5570

MEDIUM CVSS 5.4 2025-07-08
Threat Entry Updated 2025-08-13

CVE-2025-6238 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to open redirect in version 2.8.4. This is due to an insecure OAuth implementation, as the 'redirect_uri' parameter is missing validation during the authorization flow. This makes it possible for unauthenticated attackers to intercept the authorization code and obtain an access token by redirecting the user to an attacker-controlled URI. Note: OAuth is disabled, the 'Meow_MWAI_Labs_OAuth' class is not loaded in the plugin in the patched version 2.8.5.

PLUGIN Ai Engine

CVE-2025-6238

HIGH CVSS 8.0 2025-07-04
Threat Entry Updated 2025-08-11

CVE-2025-5071 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'Meow_MWAI_Labs_MCP::can_access_mcp' function in versions 2.8.0 to 2.8.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to have full access to the MCP and run various commands like 'wp_create_user', 'wp_update_user' and 'wp_update_option', which can be used for privilege escalation, and 'wp_update_post', 'wp_delete_post', 'wp_update_comment' and 'wp_delete_comment', which can be used to edit and delete posts and comments.

PLUGIN Ai Engine

CVE-2025-5071

HIGH CVSS 8.8 2025-06-19
Threat Entry Updated 2025-05-17

CVE-2024-10499 - Ai Engine Plugin

The AI Engine WordPress plugin before 2.6.5 does not sanitize and escape a parameter from one of its RESP API endpoint before using it in a SQL statement, allowing admins to perform SQL injection attacks

PLUGIN Ai Engine

CVE-2024-10499

HIGH CVSS 7.2 2024-12-12
Threat Entry Updated 2024-09-27

CVE-2024-6723 - Ai Engine Plugin

The AI Engine WordPress plugin before 2.4.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin users when viewing chatbot discussions.

PLUGIN Ai Engine

CVE-2024-6723

MEDIUM CVSS 4.7 2024-09-13
Threat Entry Updated 2025-05-27

CVE-2024-6451 - Ai Engine Plugin

AI Engine < 2.4.3 is susceptible to remote-code-execution (RCE) via Log Poisoning. The AI Engine WordPress plugin before 2.5.1 fails to validate the file extension of "logs_path", allowing Administrators to change log filetypes from .log to .php.

PLUGIN Ai Engine

CVE-2024-6451

HIGH CVSS 7.2 2024-08-19
Threat Entry Updated 2025-01-16

CVE-2024-0378 - Ai Engine Plugin

The AI Engine: Chatbots, Generators, Assistants, GPT 4 and more! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the AI chat data when discussion tracking is enabled in all versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ai Engine

CVE-2024-0378

MEDIUM CVSS 6.5 2024-03-02
Threat Entry Updated 2025-05-15

CVE-2024-0699 - Ai Engine Plugin

The AI Engine: Chatbots, Generators, Assistants, GPT 4 and more! plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'add_image_from_url' function in all versions up to, and including, 2.1.4. This makes it possible for authenticated attackers, with Editor access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Ai Engine

CVE-2024-0699

MEDIUM CVSS 6.6 2024-02-05
Threat Entry Updated 2024-11-21

CVE-2023-2580 - Ai Engine Plugin

The AI Engine WordPress plugin before 1.6.83 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).

PLUGIN Ai Engine

CVE-2023-2580

MEDIUM CVSS 4.8 2023-06-27
Scroll to top