Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0746: CWE-918 Server-Side Request Forgery (SSRF) in tigroumeow AI Engine – The Chatbot and AI Framework for WordPress

0
Medium
VulnerabilityCVE-2026-0746cvecve-2026-0746cwe-918
Published: Tue Jan 27 2026 (01/27/2026, 18:27:55 UTC)
Source: CVE Database V5
Vendor/Project: tigroumeow
Product: AI Engine – The Chatbot and AI Framework for WordPress

Description

CVE-2026-0746 is a Server-Side Request Forgery (SSRF) vulnerability in the AI Engine WordPress plugin (versions up to 3. 3. 2). It allows authenticated users with Subscriber-level access or higher to make arbitrary web requests from the server via the 'get_audio' function. Exploitation requires the plugin's 'Public API' to be enabled and the server's 'allow_url_fopen' setting to be On. This vulnerability can lead to unauthorized internal network scanning and data access, impacting confidentiality and integrity. The CVSS score is 6. 4 (medium severity), reflecting network exploitability with low privileges and no user interaction needed. No known public exploits exist yet. European organizations using this plugin, especially those with public-facing WordPress sites and enabled Public API, are at risk.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:31:11 UTC

Technical Analysis

CVE-2026-0746 is a Server-Side Request Forgery (SSRF) vulnerability identified in the AI Engine plugin for WordPress, a chatbot and AI framework widely used to enhance website interactivity. The vulnerability exists in all versions up to and including 3.3.2, specifically within the 'get_audio' function. SSRF vulnerabilities allow attackers to induce the server to make HTTP requests to arbitrary locations, potentially accessing internal or protected resources not directly reachable from the outside. In this case, exploitation requires an attacker to be authenticated with at least Subscriber-level privileges, which is a relatively low-level access in WordPress, often granted to registered users or commenters. The attack vector is further conditioned on two factors: the plugin's 'Public API' feature must be enabled, and the server's PHP configuration must have 'allow_url_fopen' set to On, which permits file functions to retrieve data from remote locations. When these conditions are met, an attacker can leverage the 'get_audio' function to craft requests that reach internal services, potentially querying sensitive information or modifying data if internal APIs are vulnerable. The vulnerability impacts confidentiality and integrity but does not affect availability. The CVSS 3.1 base score is 6.4, reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and a scope change due to potential access to internal resources. No public exploits have been reported yet, but the presence of this vulnerability in a popular WordPress plugin poses a significant risk, especially for websites exposing the Public API. The vulnerability was published on January 27, 2026, with no patch links currently available, indicating that mitigation relies on configuration changes and access control until an official fix is released.

Potential Impact

For European organizations, this SSRF vulnerability presents a moderate risk primarily to websites using the AI Engine WordPress plugin with the Public API enabled. Exploitation could allow attackers to bypass perimeter defenses and access internal services, potentially exposing sensitive data or enabling further lateral movement within the network. This is particularly concerning for organizations with complex internal APIs or microservices architectures. Confidentiality is at risk as internal endpoints might reveal sensitive information. Integrity could also be compromised if internal services allow data modification via these requests. Although availability is not directly impacted, successful exploitation could be a stepping stone for more damaging attacks. Organizations relying heavily on WordPress for customer interaction, e-commerce, or internal portals should be vigilant. The risk is amplified in environments where 'allow_url_fopen' is enabled, a common default in many PHP installations. Given the medium CVSS score and the requirement for authenticated access, the threat is moderate but should not be underestimated, especially in sectors with strict data protection regulations like GDPR. Attackers could leverage low-privilege accounts, which are easier to obtain or compromise, to exploit this vulnerability, increasing the attack surface.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first audit their WordPress installations to identify the presence of the AI Engine plugin and verify the version in use. If the plugin is present and the version is 3.3.2 or earlier, immediate action is required. Disable the 'Public API' feature in the plugin settings if it is not essential for business operations, as this is a key enabler of the SSRF exploit. Review and harden PHP configurations by setting 'allow_url_fopen' to Off unless absolutely necessary, reducing the risk of remote file inclusion and SSRF. Implement strict access controls and monitoring on internal services to detect and prevent unauthorized requests originating from the web server. Employ Web Application Firewalls (WAFs) with rules designed to detect and block SSRF patterns targeting internal IP ranges. Monitor logs for unusual outbound requests from the web server, especially to internal IP addresses or unexpected external domains. Encourage users to upgrade to patched versions of the plugin once available and maintain a robust patch management process. Additionally, restrict Subscriber-level user capabilities where possible and enforce strong authentication mechanisms to reduce the likelihood of account compromise. Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities in web applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T19:06:51.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979058d4623b1157c3e03ef

Added to database: 1/27/2026, 6:35:57 PM

Last enriched: 2/4/2026, 9:31:11 AM

Last updated: 2/7/2026, 4:30:58 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats