Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1400: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine – The Chatbot and AI Framework for WordPress

0
High
VulnerabilityCVE-2026-1400cvecve-2026-1400cwe-434
Published: Wed Jan 28 2026 (01/28/2026, 08:26:56 UTC)
Source: CVE Database V5
Vendor/Project: tigroumeow
Product: AI Engine – The Chatbot and AI Framework for WordPress

Description

CVE-2026-1400 is a high-severity vulnerability in the AI Engine – The Chatbot and AI Framework for WordPress plugin that allows authenticated users with Editor-level privileges or higher to upload arbitrary files due to missing file type validation. Attackers can upload a benign image file and then rename it to a PHP file via the update_media_metadata REST endpoint, enabling remote code execution on the affected server. This vulnerability affects all versions up to and including 3. 3. 2. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality, integrity, and availability of the affected WordPress sites. No public exploits are known yet, but the risk is significant given the ease of exploitation and potential for server compromise. European organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized code execution and potential full system compromise.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:22:49 UTC

Technical Analysis

CVE-2026-1400 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the AI Engine – The Chatbot and AI Framework for WordPress plugin. The flaw exists in the rest_helpers_update_media_metadata function, which lacks proper validation of file types during media metadata updates. Authenticated users with Editor-level or higher permissions can exploit this by first uploading a benign image file, then leveraging the update_media_metadata REST API endpoint to rename the file extension to .php, effectively creating an executable PHP file within the WordPress uploads directory. This enables remote code execution (RCE) on the server hosting the WordPress site. The vulnerability affects all versions up to and including 3.3.2 of the plugin. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation by authenticated users make it a critical risk for WordPress sites using this plugin. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. This vulnerability could allow attackers to execute arbitrary code, potentially leading to full site takeover, data theft, or service disruption.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress sites with the AI Engine plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to compromise the confidentiality of sensitive data, alter or delete content (integrity), and disrupt service availability. This can result in data breaches, defacement, or complete site downtime. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly at risk due to the sensitive nature of their data and regulatory requirements like GDPR. The requirement for Editor-level access means insider threats or compromised user accounts can be leveraged to exploit this vulnerability. Additionally, the widespread use of WordPress across Europe increases the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the AI Engine plugin and verify the version in use. Until an official patch is released, they should restrict Editor-level and higher privileges to trusted users only and consider temporarily downgrading user permissions where feasible. Implementing Web Application Firewalls (WAF) with rules to detect and block suspicious file uploads or REST API calls related to media metadata updates can help mitigate exploitation attempts. Monitoring logs for unusual file renaming activities or unexpected PHP files in the uploads directory is critical. Organizations should also enforce strong authentication mechanisms, including multi-factor authentication (MFA) for all users with elevated privileges, to reduce the risk of account compromise. Regular backups and incident response plans should be updated to prepare for potential exploitation. Once a patch is available, prompt application is essential. Additionally, disabling or limiting REST API endpoints related to media metadata updates for non-administrative users can reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-23T21:44:13.311Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979cdf04623b1157ca477fe

Added to database: 1/28/2026, 8:50:56 AM

Last enriched: 2/4/2026, 9:22:49 AM

Last updated: 2/6/2026, 2:14:55 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats