Skip to main content

CVE-2025-5071: CWE-863 Incorrect Authorization in tigroumeow AI Engine

High
VulnerabilityCVE-2025-5071cvecve-2025-5071cwe-863
Published: Thu Jun 19 2025 (06/19/2025, 09:23:47 UTC)
Source: CVE Database V5
Vendor/Project: tigroumeow
Product: AI Engine

Description

The AI Engine plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'Meow_MWAI_Labs_MCP::can_access_mcp' function in versions 2.8.0 to 2.8.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to have full access to the MCP and run various commands like 'wp_create_user', 'wp_update_user' and 'wp_update_option', which can be used for privilege escalation, and 'wp_update_post', 'wp_delete_post', 'wp_update_comment' and 'wp_delete_comment', which can be used to edit and delete posts and comments.

AI-Powered Analysis

AILast updated: 06/19/2025, 10:01:38 UTC

Technical Analysis

CVE-2025-5071 is a high-severity vulnerability affecting the tigroumeow AI Engine plugin for WordPress, specifically versions 2.8.0 through 2.8.3. The root cause is an incorrect authorization check (CWE-863) in the function 'Meow_MWAI_Labs_MCP::can_access_mcp'. This function lacks proper capability verification, allowing authenticated users with subscriber-level privileges or higher to gain unauthorized full access to the plugin's Management Control Panel (MCP). Exploiting this flaw, attackers can execute sensitive WordPress commands such as 'wp_create_user', 'wp_update_user', and 'wp_update_option', enabling privilege escalation to administrator roles. Additionally, commands like 'wp_update_post', 'wp_delete_post', 'wp_update_comment', and 'wp_delete_comment' can be abused to modify or delete site content and user comments. The vulnerability requires no user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required at a low level (subscriber). No known exploits are currently reported in the wild, but the potential for damage is significant given the widespread use of WordPress and the plugin's capabilities. The absence of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the tigroumeow AI Engine plugin installed. Successful exploitation can lead to unauthorized creation or modification of user accounts, including escalation to administrative privileges, which compromises the entire website's security posture. Attackers can manipulate or delete critical content and user-generated data, potentially disrupting business operations, damaging reputation, and violating data protection regulations such as GDPR. The ability to alter site options may also allow attackers to implant persistent backdoors or redirect traffic to malicious sites. Given the plugin's AI capabilities, there is a risk that sensitive AI-generated data or configurations could be tampered with or exfiltrated. The impact extends to e-commerce, government, media, and other sectors heavily dependent on WordPress for content management and customer engagement across Europe.

Mitigation Recommendations

1. Immediate mitigation should include restricting subscriber-level user registrations and reviewing existing user roles to minimize exposure. 2. Implement strict monitoring and logging of user activities related to the AI Engine plugin and WordPress user management functions to detect suspicious behavior. 3. Employ Web Application Firewalls (WAF) with custom rules to block unauthorized access attempts to the MCP endpoints. 4. Disable or remove the tigroumeow AI Engine plugin if it is not essential, until a security patch is released. 5. For sites that must continue using the plugin, apply manual code audits and temporary patches to enforce capability checks on 'can_access_mcp' or restrict access to trusted IP ranges. 6. Regularly update WordPress core and plugins once the vendor releases a patch addressing this vulnerability. 7. Conduct user privilege audits to ensure least privilege principles are enforced and remove unnecessary subscriber accounts. 8. Educate site administrators about the risks and signs of compromise related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-21T22:04:13.168Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6853dc7f33c7acc046090eb5

Added to database: 6/19/2025, 9:46:39 AM

Last enriched: 6/19/2025, 10:01:38 AM

Last updated: 8/11/2025, 2:02:33 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats