Skip to main content

CVE-2025-6238: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in tigroumeow AI Engine

High
VulnerabilityCVE-2025-6238cvecve-2025-6238cwe-601
Published: Fri Jul 04 2025 (07/04/2025, 01:44:02 UTC)
Source: CVE Database V5
Vendor/Project: tigroumeow
Product: AI Engine

Description

The AI Engine plugin for WordPress is vulnerable to open redirect in version 2.8.4. This is due to an insecure OAuth implementation, as the 'redirect_uri' parameter is missing validation during the authorization flow. This makes it possible for unauthenticated attackers to intercept the authorization code and obtain an access token by redirecting the user to an attacker-controlled URI. Note: OAuth is disabled, the 'Meow_MWAI_Labs_OAuth' class is not loaded in the plugin in the patched version 2.8.5.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:27:44 UTC

Technical Analysis

CVE-2025-6238 is a high-severity vulnerability classified as an Open Redirect (CWE-601) found in version 2.8.4 of the tigroumeow AI Engine WordPress plugin. The root cause is an insecure OAuth implementation where the 'redirect_uri' parameter is not validated during the OAuth authorization flow. This flaw allows unauthenticated attackers to manipulate the redirection endpoint, causing the authorization code to be sent to an attacker-controlled URI. By intercepting this authorization code, attackers can obtain an OAuth access token, potentially granting them unauthorized access to protected resources or user accounts. The vulnerability requires user interaction, as the victim must initiate the OAuth flow, but no prior authentication is needed for the attacker to exploit it. The plugin author addressed this issue in version 2.8.5 by disabling OAuth and removing the vulnerable 'Meow_MWAI_Labs_OAuth' class. The CVSS v3.1 score of 8.0 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity but requiring user interaction and limited privileges. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk if weaponized, especially in environments where the AI Engine plugin is used for sensitive operations or data.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive data or systems integrated with the tigroumeow AI Engine plugin. Since the plugin is used within WordPress environments, which are prevalent across many sectors including government, healthcare, finance, and media, exploitation could result in data breaches, account takeover, and potential lateral movement within networks. The interception of OAuth tokens could allow attackers to impersonate users or escalate privileges, undermining trust in affected services. Additionally, compromised sites could be used to launch further phishing or social engineering attacks targeting European users. The impact is heightened in organizations relying on OAuth for secure authentication and authorization flows, as this vulnerability directly undermines those mechanisms.

Mitigation Recommendations

Organizations should immediately upgrade the tigroumeow AI Engine plugin to version 2.8.5 or later, where OAuth is disabled and the vulnerable code removed. If upgrading is not immediately possible, administrators should disable OAuth functionality within the plugin configuration to prevent exploitation. Additionally, monitoring OAuth authorization logs for unusual redirect URIs or authorization code requests can help detect attempted exploitation. Implementing strict Content Security Policy (CSP) headers and validating all redirect URIs at the application level can provide defense-in-depth. Educating users about phishing risks related to OAuth flows and encouraging cautious interaction with authorization prompts is also recommended. Finally, organizations should audit their OAuth client registrations to ensure redirect URIs are strictly controlled and whitelist only trusted endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-18T13:58:33.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5fac

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 7/14/2025, 9:27:44 PM

Last updated: 7/16/2025, 4:01:56 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats