Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11749: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tigroumeow AI Engine

0
Critical
VulnerabilityCVE-2025-11749cvecve-2025-11749cwe-200
Published: Wed Nov 05 2025 (11/05/2025, 05:31:25 UTC)
Source: CVE Database V5
Vendor/Project: tigroumeow
Product: AI Engine

Description

The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.

AI-Powered Analysis

AILast updated: 11/05/2025, 06:01:44 UTC

Technical Analysis

CVE-2025-11749 is a critical security vulnerability identified in the tigroumeow AI Engine plugin for WordPress, affecting all versions up to and including 3.1.3. The flaw resides in the /mcp/v1/ REST API endpoint, which, when the 'No-Auth URL' feature is enabled, inadvertently exposes the 'Bearer Token' used for authentication. This token exposure constitutes a CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) vulnerability. An attacker can exploit this by sending unauthenticated requests to the vulnerable endpoint to extract the bearer token without any authentication or user interaction. Possession of this token grants the attacker access to a valid session, enabling them to perform high-impact actions such as creating new administrator accounts, effectively escalating their privileges to full administrative control. The vulnerability's CVSS v3.1 score is 9.8, reflecting its critical nature due to network attack vector, no required privileges, no user interaction, and its impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and the severity of potential damage make this a high-risk issue. The vulnerability affects all plugin versions up to 3.1.3, and no patches were available at the time of reporting, emphasizing the need for immediate mitigation steps. The tigroumeow AI Engine plugin is used to enhance WordPress sites with AI capabilities, making it a target for attackers seeking to compromise websites that rely on this functionality. The exposure of bearer tokens can lead to unauthorized administrative access, data breaches, and potential site defacement or further malware deployment.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the widespread use of WordPress as a content management system across various sectors including government, finance, healthcare, and e-commerce. Unauthorized access through the exposed bearer token can lead to full administrative control over affected websites, resulting in data breaches, defacement, disruption of services, and potential lateral movement within organizational networks. The compromise of administrator accounts can also facilitate the installation of backdoors or malware, undermining the integrity and availability of critical web services. Given the critical CVSS score and the lack of required authentication or user interaction, attackers can exploit this vulnerability remotely and at scale. Organizations with public-facing WordPress sites that have enabled the 'No-Auth URL' feature are particularly vulnerable. The impact extends beyond individual websites to potentially affect customer trust, regulatory compliance (e.g., GDPR), and operational continuity. The absence of known exploits in the wild currently provides a window for proactive defense, but the risk of imminent exploitation remains high.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the tigroumeow AI Engine plugin and verify the version in use. If the plugin version is 3.1.3 or earlier, they should disable the 'No-Auth URL' feature in the plugin settings to prevent bearer token exposure. Until an official patch is released, consider temporarily deactivating or removing the plugin if disabling the feature is not feasible. Implement strict access controls and monitoring on the /mcp/v1/ REST API endpoint to detect and block unauthorized requests. Employ Web Application Firewalls (WAFs) with custom rules to restrict access to sensitive API endpoints. Regularly review WordPress user accounts for unauthorized administrator additions and audit logs for suspicious activities. Organizations should also ensure that their WordPress core, plugins, and themes are kept up to date and subscribe to vulnerability advisories for timely patching. Additionally, implement multi-factor authentication (MFA) for WordPress administrator accounts to mitigate the impact of compromised credentials. Finally, conduct penetration testing and security assessments focused on API endpoints to identify similar exposures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-14T15:04:46.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ae4c4c336e58df48942bc

Added to database: 11/5/2025, 5:46:44 AM

Last enriched: 11/5/2025, 6:01:44 AM

Last updated: 11/5/2025, 10:35:17 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats