Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Upwork Freelancers vs Dedicated React.js Teams: What’s Better for Your Project in 2025?

      August 1, 2025

      Is Agile dead in the age of AI?

      August 1, 2025

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      The Core Model: Start FROM The Answer, Not WITH The Solution

      July 31, 2025

      Finally, a sleek gaming laptop I can take to the office (without sacrificing power)

      August 1, 2025

      These jobs face the highest risk of AI takeover, according to Microsoft

      August 1, 2025

      Apple’s tariff costs and iPhone sales are soaring – how long until device prices are too?

      August 1, 2025

      5 ways to successfully integrate AI agents into your workplace

      August 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025
      Recent

      Enhancing Laravel Queries with Reusable Scope Patterns

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025

      Everything We Know About Livewire 4

      August 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      YouTube wants to use AI to treat “teens as teens and adults as adults” — with the most age-appropriate experiences and protections

      August 1, 2025
      Recent

      YouTube wants to use AI to treat “teens as teens and adults as adults” — with the most age-appropriate experiences and protections

      August 1, 2025

      Sam Altman is afraid of OpenAI’s GPT-5 creation — “The Manhattan Project feels very fast, like there are no adults in the room”

      August 1, 2025

      9 new features that arrived on the Windows 11 Insider Program during the second half of July 2025

      August 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»WordPress AI Engine Plugin Bug Allows Remote Code Execution – Update Now

    WordPress AI Engine Plugin Bug Allows Remote Code Execution – Update Now

    August 1, 2025

    AI Engine vulnerability

    A security flaw affecting over 100,000 WordPress websites has been discovered in the AI Engine plugin, specifically impacting versions 2.9.3 and 2.9.4. The vulnerability, classified as an arbitrary file upload vulnerability, allows authenticated users, starting from subscriber-level access, to upload malicious files and potentially gain remote code execution (RCE) privileges on the server. This type of vulnerability could result in full site compromise. 

    The issue, tracked under CVE-2025-7847, was responsibly reported to Wordfence on July 18, 2025, by a researcher known as ISMAILSHADOW through the Wordfence Bug Bounty Program. The vulnerability was introduced just one day earlier, on July 17. For their timely discovery, the researcher was awarded a bounty of $1,170. 

    Technical Analysis of the AI Engine Vulnerability 

    The vulnerability resides in the rest_simpleFileUpload() function of the plugin, which failed to enforce proper file type validation. In affected versions, when the “Public API” option is enabled, which is disabled by default, any authenticated user could interact with the plugin’s REST API endpoint /mwai/v1/simpleFileUpload. Without any configured Bearer Token authentication, this endpoint accepts arbitrary files, including PHP scripts, allowing attackers to place malicious code in the site’s public uploads directory. 

    The issue lies in the upload_file() function in the Meow_MWAI_Modules_Files class. This function used PHP’s native copy() function to store uploaded files without verifying the file’s MIME type or extension. As a result, attackers could bypass file restrictions and execute PHP scripts uploaded to the server. These scripts could be accessed via a browser, leading to remote code execution, one of the most dangerous outcomes of an arbitrary file upload vulnerability. 

    Exploitation Conditions 

    It’s important to notice that this flaw does not impact all AI Engine users. Exploitation requires that: 

    • The “Public API” option in the plugin settings is enabled. 
    • No Bearer Token or custom authentication method has been configured. 
    • The user is authenticated (even a subscriber role is sufficient). 

    When these conditions are met, the plugin’s REST endpoint becomes vulnerable, giving low-level users a pathway to execute malicious server-side code. 

    Patch and Remediation 

    On July 22, 2025, the plugin developer, Jordy Meow, responded quickly and released version 2.9.5, which includes a fix. The patch introduces proper validation using WordPress’s built-in wp_check_filetype() function in both the simpleFileUpload() and upload_file() methods. This ensures only permitted file types are accepted, effectively mitigating the vulnerability. 

    Security Measures and Timelines 

    • July 18, 2025: Vulnerability submitted to Wordfence. 
    • July 18, 2025: Validated and disclosed to the developer via the Wordfence Vulnerability Management Portal. 
    • July 21, 2025: A firewall rule was deployed to Wordfence Premium, Care, and Response users. 
    • July 22, 2025: Patched version 2.9.5 of AI Engine released. 
    • August 20, 2025: Protection will be available to Wordfence Free users. 

    Wordfence’s rapid response helped narrow the opportunity for exploitation. Still, due to the seriousness of the CVE-2025-7847 vulnerability, all users of the AI Engine plugin are urged to update to version 2.9.5 or later immediately, particularly if their site has the Public API feature enabled. 

    Conclusion 

    The CVE-2025-7847 vulnerability in the AI Engine plugin stresses the importance of proper input validation and access control, especially for plugins with public API features. Even minor oversights can lead to serious security risks like remote code execution. With AI Engine’s widespread use, ensuring REST API endpoints are secured with authentication is essential. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleStorm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
    Next Article This month in security with Tony Anscombe – July 2025 edition

    Related Posts

    Development

    Enhancing Laravel Queries with Reusable Scope Patterns

    August 1, 2025
    Development

    Everything We Know About Livewire 4

    August 1, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

    Security

    MeshLab processes and edits 3D triangular meshes

    Linux

    OpenAI Confirms GPT-5 Launch This Summer with Full Multimodal AI Capabilities

    Operating Systems

    CVE-2025-25228 – VirtueMart SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Microsoft Edge may be deprecating “Mobile Wallet” on Android that was never available

    April 18, 2025

    Microsoft Edge on desktop has Wallet available, which securely stores passwords, addresses, and payment information…

    CVE-2025-5067 – Inappropriate implementation in Tab Strip in Googl

    May 27, 2025

    CVE-2025-49815 – Apache HTTP Server Information Disclosure

    June 12, 2025

    CVE-2024-32124 – FortiIsolator Improper Access Control Logging Vulnerability

    July 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.