Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5071: CWE-863 Incorrect Authorization in tigroumeow AI Engine

0
High
VulnerabilityCVE-2025-5071cvecve-2025-5071cwe-863
Published: Thu Jun 19 2025 (06/19/2025, 09:23:47 UTC)
Source: CVE Database V5
Vendor/Project: tigroumeow
Product: AI Engine

Description

The AI Engine plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'Meow_MWAI_Labs_MCP::can_access_mcp' function in versions 2.8.0 to 2.8.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to have full access to the MCP and run various commands like 'wp_create_user', 'wp_update_user' and 'wp_update_option', which can be used for privilege escalation, and 'wp_update_post', 'wp_delete_post', 'wp_update_comment' and 'wp_delete_comment', which can be used to edit and delete posts and comments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:03:08 UTC

Technical Analysis

CVE-2025-5071 is an authorization bypass vulnerability in the tigroumeow AI Engine plugin for WordPress, specifically affecting versions 2.8.0 through 2.8.3. The root cause is a missing capability check in the 'Meow_MWAI_Labs_MCP::can_access_mcp' function, which is responsible for verifying whether a user has permission to access the plugin's management control panel (MCP). Due to this flaw, any authenticated user with subscriber-level access or higher can bypass intended access restrictions and gain full control over the MCP. This elevated access allows execution of critical WordPress commands such as 'wp_create_user', 'wp_update_user', and 'wp_update_option', facilitating privilege escalation by creating or modifying user accounts and changing site options. Additionally, commands like 'wp_update_post', 'wp_delete_post', 'wp_update_comment', and 'wp_delete_comment' enable unauthorized editing or deletion of site content and comments. The vulnerability does not require user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact spans confidentiality, integrity, and availability, as attackers can manipulate data, escalate privileges, and disrupt site content. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. However, the high CVSS score of 8.8 reflects the critical nature of the vulnerability and the urgency for remediation.

Potential Impact

The vulnerability poses a significant risk to organizations running WordPress sites with the tigroumeow AI Engine plugin versions 2.8.0 to 2.8.3. Attackers with minimal privileges (subscriber-level) can escalate their privileges to administrator-level by exploiting the missing authorization check, potentially gaining full control over the WordPress environment. This can lead to unauthorized creation or modification of user accounts, enabling persistent backdoors or insider threats. Furthermore, attackers can manipulate or delete posts and comments, damaging the integrity and availability of website content, which can harm reputation and user trust. The ability to update site options may allow attackers to alter site configurations, potentially leading to further compromise or denial of service. Given WordPress's widespread use globally, this vulnerability could be leveraged in targeted attacks against organizations relying on this plugin, including businesses, government agencies, and media outlets. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code may emerge rapidly after public disclosure.

Mitigation Recommendations

1. Immediate upgrade: Organizations should update the tigroumeow AI Engine plugin to a patched version once available. In the absence of an official patch, consider temporarily disabling or uninstalling the plugin to eliminate the attack surface. 2. Access restriction: Limit subscriber-level user registrations and audit existing user roles to ensure no unnecessary privileges are granted. 3. Implement Web Application Firewall (WAF) rules to monitor and block suspicious requests targeting the MCP endpoints or commands associated with the plugin. 4. Monitor logs for unusual activity related to user creation, updates, or content modifications that could indicate exploitation attempts. 5. Harden WordPress security by enforcing strong authentication mechanisms, such as multi-factor authentication for all users with elevated privileges. 6. Conduct regular security audits and vulnerability scans focusing on plugins and their access controls. 7. If feasible, apply custom code or filters to enforce capability checks on the MCP functions as a temporary workaround until official patches are released. 8. Educate site administrators and users about the risks of privilege escalation and encourage prompt reporting of suspicious behavior.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-21T22:04:13.168Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6853dc7f33c7acc046090eb5

Added to database: 6/19/2025, 9:46:39 AM

Last enriched: 2/27/2026, 3:03:08 PM

Last updated: 3/28/2026, 9:17:40 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses