CVE-2025-7847: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine
The AI Engine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the rest_simpleFileUpload() function in versions 2.9.3 and 2.9.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server when the REST API is enabled, which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-7847 is a high-severity vulnerability affecting the tigroumeow AI Engine WordPress plugin, specifically versions 2.9.3 and 2.9.4. The vulnerability arises from the rest_simpleFileUpload() function, which lacks proper file type validation, allowing authenticated users with Subscriber-level access or higher to upload arbitrary files to the server when the WordPress REST API is enabled. This unrestricted file upload vulnerability (CWE-434) can be exploited to upload malicious files, potentially leading to remote code execution (RCE) on the affected web server. The vulnerability is particularly dangerous because it requires only low-privilege authentication and no user interaction beyond that, and the attack surface is exposed via the REST API, which is commonly enabled in modern WordPress installations. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement of only low privileges. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the widespread use of WordPress and the tigroumeow AI Engine plugin for AI-related content generation and processing. Without proper file type validation, attackers can upload web shells or other malicious payloads, leading to full server compromise, data theft, defacement, or pivoting to internal networks.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the tigroumeow AI Engine plugin enabled. The potential for remote code execution means attackers could gain full control over web servers, leading to data breaches involving sensitive personal data protected under GDPR, service disruptions, and reputational damage. Organizations in sectors such as e-commerce, media, education, and government that utilize WordPress extensively are at heightened risk. The ability for low-privilege users to exploit this flaw increases the threat from insider threats or compromised accounts. Additionally, the REST API exposure means that automated attacks could be launched remotely without direct user interaction, increasing the likelihood of exploitation. The impact extends beyond confidentiality to integrity and availability, as attackers could deface websites, inject malicious content, or disrupt services critical to business operations.
Mitigation Recommendations
To mitigate this vulnerability effectively, organizations should take the following specific actions: 1) Immediately update the tigroumeow AI Engine plugin to a patched version once available, as no patch links are currently provided, monitoring vendor advisories closely. 2) Temporarily disable or restrict access to the WordPress REST API if it is not essential, using plugins or server-level controls to limit exposure. 3) Implement strict file upload restrictions at the web server or application firewall level, enforcing MIME type and extension whitelisting to prevent dangerous file types from being accepted. 4) Enforce the principle of least privilege by reviewing and minimizing user roles, especially Subscriber-level accounts, and monitoring for suspicious account activity. 5) Deploy Web Application Firewalls (WAFs) with rules targeting arbitrary file upload attempts and anomalous REST API usage patterns. 6) Conduct regular security audits and vulnerability scans focusing on WordPress plugins and REST API endpoints. 7) Monitor logs for unusual file uploads or execution attempts and establish incident response procedures for rapid containment. These measures, combined, reduce the attack surface and limit the potential for exploitation until a vendor patch is applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7847: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine
Description
The AI Engine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the rest_simpleFileUpload() function in versions 2.9.3 and 2.9.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server when the REST API is enabled, which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-7847 is a high-severity vulnerability affecting the tigroumeow AI Engine WordPress plugin, specifically versions 2.9.3 and 2.9.4. The vulnerability arises from the rest_simpleFileUpload() function, which lacks proper file type validation, allowing authenticated users with Subscriber-level access or higher to upload arbitrary files to the server when the WordPress REST API is enabled. This unrestricted file upload vulnerability (CWE-434) can be exploited to upload malicious files, potentially leading to remote code execution (RCE) on the affected web server. The vulnerability is particularly dangerous because it requires only low-privilege authentication and no user interaction beyond that, and the attack surface is exposed via the REST API, which is commonly enabled in modern WordPress installations. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the requirement of only low privileges. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the widespread use of WordPress and the tigroumeow AI Engine plugin for AI-related content generation and processing. Without proper file type validation, attackers can upload web shells or other malicious payloads, leading to full server compromise, data theft, defacement, or pivoting to internal networks.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress sites with the tigroumeow AI Engine plugin enabled. The potential for remote code execution means attackers could gain full control over web servers, leading to data breaches involving sensitive personal data protected under GDPR, service disruptions, and reputational damage. Organizations in sectors such as e-commerce, media, education, and government that utilize WordPress extensively are at heightened risk. The ability for low-privilege users to exploit this flaw increases the threat from insider threats or compromised accounts. Additionally, the REST API exposure means that automated attacks could be launched remotely without direct user interaction, increasing the likelihood of exploitation. The impact extends beyond confidentiality to integrity and availability, as attackers could deface websites, inject malicious content, or disrupt services critical to business operations.
Mitigation Recommendations
To mitigate this vulnerability effectively, organizations should take the following specific actions: 1) Immediately update the tigroumeow AI Engine plugin to a patched version once available, as no patch links are currently provided, monitoring vendor advisories closely. 2) Temporarily disable or restrict access to the WordPress REST API if it is not essential, using plugins or server-level controls to limit exposure. 3) Implement strict file upload restrictions at the web server or application firewall level, enforcing MIME type and extension whitelisting to prevent dangerous file types from being accepted. 4) Enforce the principle of least privilege by reviewing and minimizing user roles, especially Subscriber-level accounts, and monitoring for suspicious account activity. 5) Deploy Web Application Firewalls (WAFs) with rules targeting arbitrary file upload attempts and anomalous REST API usage patterns. 6) Conduct regular security audits and vulnerability scans focusing on WordPress plugins and REST API endpoints. 7) Monitor logs for unusual file uploads or execution attempts and establish incident response procedures for rapid containment. These measures, combined, reduce the attack surface and limit the potential for exploitation until a vendor patch is applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-18T20:25:13.424Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688af1f7ad5a09ad00b2c41f
Added to database: 7/31/2025, 4:32:55 AM
Last enriched: 7/31/2025, 4:47:54 AM
Last updated: 7/31/2025, 8:13:36 PM
Views: 6
Related Threats
CVE-2025-23289: CWE-532 Insertion of Sensitive Information into Log File in NVIDIA NVIDIA Omniverse Launcher
MediumCVE-2025-48073: CWE-476: NULL Pointer Dereference in AcademySoftwareFoundation openexr
MediumCVE-2025-48072: CWE-125: Out-of-bounds Read in AcademySoftwareFoundation openexr
MediumCVE-2025-48071: CWE-122: Heap-based Buffer Overflow in AcademySoftwareFoundation openexr
HighCVE-2025-45768: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.