CVE-2025-8084: CWE-918 Server-Side Request Forgery (SSRF) in tigroumeow AI Engine
The AI Engine plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.8 via the rest_helpers_create_images function. This makes it possible for authenticated attackers, with Editor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. On Cloud instances, this issue allows for metadata retrieving.
AI Analysis
Technical Summary
CVE-2025-8084 is a Server-Side Request Forgery (SSRF) vulnerability identified in the tigroumeow AI Engine plugin for WordPress, affecting all versions up to and including 3.1.8. The vulnerability resides in the rest_helpers_create_images function, which improperly validates or restricts URLs that can be requested by the plugin. Authenticated attackers with Editor-level or higher privileges can exploit this flaw to induce the server to send HTTP requests to arbitrary locations, including internal network services or cloud metadata endpoints. This can lead to unauthorized information disclosure, such as internal IP addresses, service endpoints, or sensitive metadata that could facilitate further attacks or privilege escalation. The vulnerability requires authentication but no user interaction, and the attack scope is limited to users with elevated WordPress roles, which reduces the attack surface but still poses a significant risk in compromised or insider threat scenarios. The CVSS 3.1 base score is 6.8, reflecting medium severity with high confidentiality impact but no integrity or availability impact. No public exploits are known at this time, but the vulnerability is published and should be addressed promptly. The issue is particularly critical for cloud-hosted WordPress instances where metadata services can be queried, potentially exposing cloud credentials or configuration details. The vulnerability is classified under CWE-918, which covers SSRF issues that allow attackers to abuse server functionality to access or manipulate internal resources.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive internal information disclosure, especially in environments where WordPress is used extensively and hosted on cloud infrastructure. Attackers with Editor-level access could leverage this SSRF to query internal services, potentially mapping internal networks or retrieving cloud metadata that may contain credentials or configuration data. This can facilitate lateral movement, privilege escalation, or further targeted attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks if internal data is exposed. The impact on confidentiality is high, while integrity and availability remain unaffected. The requirement for authenticated access limits the attack vector but does not eliminate risk, particularly if credential compromise or insider threats exist. Cloud-hosted WordPress instances in Europe are especially vulnerable due to the ability to access cloud metadata services, which can lead to broader cloud environment compromise.
Mitigation Recommendations
1. Restrict plugin access strictly to trusted users with Editor-level or higher privileges and review user roles regularly to minimize exposure. 2. Monitor and log outbound HTTP requests originating from the WordPress server to detect unusual or unauthorized internal requests. 3. Implement network segmentation and firewall rules to limit the WordPress server’s ability to access sensitive internal services and cloud metadata endpoints. 4. Apply principle of least privilege to WordPress users and service accounts to reduce the risk of exploitation. 5. Disable or restrict the vulnerable rest_helpers_create_images function if possible until a patch is available. 6. Stay updated with tigroumeow vendor advisories and apply security patches promptly once released. 7. Conduct internal penetration testing and vulnerability assessments focusing on SSRF and internal service exposure. 8. For cloud deployments, use cloud provider features to restrict metadata service access, such as metadata service versioning or access tokens. 9. Educate administrators and users about the risks of SSRF and the importance of credential security to prevent privilege abuse.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-8084: CWE-918 Server-Side Request Forgery (SSRF) in tigroumeow AI Engine
Description
The AI Engine plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.8 via the rest_helpers_create_images function. This makes it possible for authenticated attackers, with Editor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. On Cloud instances, this issue allows for metadata retrieving.
AI-Powered Analysis
Technical Analysis
CVE-2025-8084 is a Server-Side Request Forgery (SSRF) vulnerability identified in the tigroumeow AI Engine plugin for WordPress, affecting all versions up to and including 3.1.8. The vulnerability resides in the rest_helpers_create_images function, which improperly validates or restricts URLs that can be requested by the plugin. Authenticated attackers with Editor-level or higher privileges can exploit this flaw to induce the server to send HTTP requests to arbitrary locations, including internal network services or cloud metadata endpoints. This can lead to unauthorized information disclosure, such as internal IP addresses, service endpoints, or sensitive metadata that could facilitate further attacks or privilege escalation. The vulnerability requires authentication but no user interaction, and the attack scope is limited to users with elevated WordPress roles, which reduces the attack surface but still poses a significant risk in compromised or insider threat scenarios. The CVSS 3.1 base score is 6.8, reflecting medium severity with high confidentiality impact but no integrity or availability impact. No public exploits are known at this time, but the vulnerability is published and should be addressed promptly. The issue is particularly critical for cloud-hosted WordPress instances where metadata services can be queried, potentially exposing cloud credentials or configuration details. The vulnerability is classified under CWE-918, which covers SSRF issues that allow attackers to abuse server functionality to access or manipulate internal resources.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive internal information disclosure, especially in environments where WordPress is used extensively and hosted on cloud infrastructure. Attackers with Editor-level access could leverage this SSRF to query internal services, potentially mapping internal networks or retrieving cloud metadata that may contain credentials or configuration data. This can facilitate lateral movement, privilege escalation, or further targeted attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks if internal data is exposed. The impact on confidentiality is high, while integrity and availability remain unaffected. The requirement for authenticated access limits the attack vector but does not eliminate risk, particularly if credential compromise or insider threats exist. Cloud-hosted WordPress instances in Europe are especially vulnerable due to the ability to access cloud metadata services, which can lead to broader cloud environment compromise.
Mitigation Recommendations
1. Restrict plugin access strictly to trusted users with Editor-level or higher privileges and review user roles regularly to minimize exposure. 2. Monitor and log outbound HTTP requests originating from the WordPress server to detect unusual or unauthorized internal requests. 3. Implement network segmentation and firewall rules to limit the WordPress server’s ability to access sensitive internal services and cloud metadata endpoints. 4. Apply principle of least privilege to WordPress users and service accounts to reduce the risk of exploitation. 5. Disable or restrict the vulnerable rest_helpers_create_images function if possible until a patch is available. 6. Stay updated with tigroumeow vendor advisories and apply security patches promptly once released. 7. Conduct internal penetration testing and vulnerability assessments focusing on SSRF and internal service exposure. 8. For cloud deployments, use cloud provider features to restrict metadata service access, such as metadata service versioning or access tokens. 9. Educate administrators and users about the risks of SSRF and the importance of credential security to prevent privilege abuse.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-23T13:29:23.642Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c6dffc50334694aba91b7
Added to database: 11/18/2025, 1:00:47 PM
Last enriched: 11/18/2025, 1:01:06 PM
Last updated: 11/19/2025, 9:18:38 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11446: CWE-532 Insertion of Sensitive Information into Log File in upKeeper Solutions upKeeper Manager
HighCVE-2025-13206: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in stellarwp GiveWP – Donation Plugin and Fundraising Platform
HighCVE-2025-13035: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesnippetspro Code Snippets
HighCVE-2025-12484: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in smub Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers
HighCVE-2025-13085: CWE-285 Improper Authorization in softaculous SiteSEO – SEO Simplified
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.