CVE-2026-1400: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine – The Chatbot and AI Framework for WordPress
CVE-2026-1400 is a high-severity vulnerability in the AI Engine – The Chatbot and AI Framework for WordPress plugin that allows authenticated users with Editor-level privileges or higher to upload arbitrary files due to missing file type validation. Attackers can upload a benign image file and then rename it to a PHP file via the update_media_metadata REST endpoint, enabling remote code execution on the affected server. This vulnerability affects all versions up to and including 3. 3. 2. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality, integrity, and availability of the affected WordPress sites. No public exploits are known yet, but the risk is significant given the ease of exploitation and potential for server compromise. European organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized code execution and potential full system compromise.
AI Analysis
Technical Summary
CVE-2026-1400 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the AI Engine – The Chatbot and AI Framework for WordPress plugin. The flaw exists in the rest_helpers_update_media_metadata function, which lacks proper validation of file types during media metadata updates. Authenticated users with Editor-level or higher permissions can exploit this by first uploading a benign image file, then leveraging the update_media_metadata REST API endpoint to rename the file extension to .php, effectively creating an executable PHP file within the WordPress uploads directory. This enables remote code execution (RCE) on the server hosting the WordPress site. The vulnerability affects all versions up to and including 3.3.2 of the plugin. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation by authenticated users make it a critical risk for WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. This vulnerability could allow attackers to execute arbitrary code, potentially leading to full site takeover, data theft, or service disruption.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress sites with the AI Engine plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to compromise the confidentiality of sensitive data, alter or delete content (integrity), and disrupt service availability. This can result in data breaches, defacement, or complete site downtime. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly at risk due to the sensitive nature of their data and regulatory requirements like GDPR. The requirement for Editor-level access means insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Additionally, the widespread use of WordPress across Europe increases the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the AI Engine plugin and verify the version in use. Until an official patch is released, they should restrict Editor-level and higher privileges to trusted users only and consider temporarily downgrading user permissions where feasible. Implementing Web Application Firewalls (WAF) with rules to detect and block suspicious file uploads or REST API calls related to media metadata updates can help mitigate exploitation attempts. Monitoring logs for unusual file renaming activities or unexpected PHP files in the uploads directory is critical. Organizations should also enforce strong authentication mechanisms, including multi-factor authentication (MFA) for all users with elevated privileges, to reduce the risk of account compromise. Regular backups and incident response plans should be updated to prepare for potential exploitation. Once a patch is available, prompt application is essential. Additionally, disabling or limiting REST API endpoints related to media metadata updates for non-administrative users can reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2026-1400: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine – The Chatbot and AI Framework for WordPress
Description
CVE-2026-1400 is a high-severity vulnerability in the AI Engine – The Chatbot and AI Framework for WordPress plugin that allows authenticated users with Editor-level privileges or higher to upload arbitrary files due to missing file type validation. Attackers can upload a benign image file and then rename it to a PHP file via the update_media_metadata REST endpoint, enabling remote code execution on the affected server. This vulnerability affects all versions up to and including 3. 3. 2. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality, integrity, and availability of the affected WordPress sites. No public exploits are known yet, but the risk is significant given the ease of exploitation and potential for server compromise. European organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized code execution and potential full system compromise.
AI-Powered Analysis
Technical Analysis
CVE-2026-1400 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the AI Engine – The Chatbot and AI Framework for WordPress plugin. The flaw exists in the rest_helpers_update_media_metadata function, which lacks proper validation of file types during media metadata updates. Authenticated users with Editor-level or higher permissions can exploit this by first uploading a benign image file, then leveraging the update_media_metadata REST API endpoint to rename the file extension to .php, effectively creating an executable PHP file within the WordPress uploads directory. This enables remote code execution (RCE) on the server hosting the WordPress site. The vulnerability affects all versions up to and including 3.3.2 of the plugin. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation by authenticated users make it a critical risk for WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. This vulnerability could allow attackers to execute arbitrary code, potentially leading to full site takeover, data theft, or service disruption.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress sites with the AI Engine plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to compromise the confidentiality of sensitive data, alter or delete content (integrity), and disrupt service availability. This can result in data breaches, defacement, or complete site downtime. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly at risk due to the sensitive nature of their data and regulatory requirements like GDPR. The requirement for Editor-level access means insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Additionally, the widespread use of WordPress across Europe increases the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the AI Engine plugin and verify the version in use. Until an official patch is released, they should restrict Editor-level and higher privileges to trusted users only and consider temporarily downgrading user permissions where feasible. Implementing Web Application Firewalls (WAF) with rules to detect and block suspicious file uploads or REST API calls related to media metadata updates can help mitigate exploitation attempts. Monitoring logs for unusual file renaming activities or unexpected PHP files in the uploads directory is critical. Organizations should also enforce strong authentication mechanisms, including multi-factor authentication (MFA) for all users with elevated privileges, to reduce the risk of account compromise. Regular backups and incident response plans should be updated to prepare for potential exploitation. Once a patch is available, prompt application is essential. Additionally, disabling or limiting REST API endpoints related to media metadata updates for non-administrative users can reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-23T21:44:13.311Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979cdf04623b1157ca477fe
Added to database: 1/28/2026, 8:50:56 AM
Last enriched: 2/4/2026, 9:22:49 AM
Last updated: 2/6/2026, 2:14:55 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.