CVE-2025-5071

8.8 HIGH

📋 TL;DR

The AI Engine WordPress plugin (versions 2.8.0-2.8.3) has a missing capability check that allows authenticated users with subscriber-level access or higher to execute privileged commands. This vulnerability enables attackers to create/update users, modify site options, and edit/delete posts and comments, leading to privilege escalation and data manipulation. All WordPress sites using the vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • AI Engine WordPress Plugin
Versions: 2.8.0 to 2.8.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with AI Engine plugin enabled. Any authenticated user (subscriber role or higher) can exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through privilege escalation to administrator, followed by data destruction, malware injection, or site defacement.

🟠

Likely Case

Unauthorized content modification, user account creation for persistent access, and privilege escalation to editor/administrator roles.

🟢

If Mitigated

Limited impact if proper access controls, monitoring, and least privilege principles are already implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is publicly documented with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.4

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3313554/ai-engine#file21

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'AI Engine' and click 'Update Now'. 4. Verify version is 2.8.4 or higher.

🔧 Temporary Workarounds

Disable AI Engine Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate ai-engine

Restrict User Registration

all

Disable new user registration to prevent attacker account creation.

Navigate to Settings > General in WordPress admin and uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Remove subscriber and higher role access for untrusted users
  • Implement web application firewall rules to block suspicious MCP API requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for AI Engine version. If version is between 2.8.0 and 2.8.3, system is vulnerable.

Check Version:

wp plugin get ai-engine --field=version

Verify Fix Applied:

Confirm AI Engine plugin version is 2.8.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=meow_mwai_labs_mcp
  • Multiple user creation/modification events from non-admin accounts
  • Unexpected post/comment modifications from subscriber-level users

Network Indicators:

  • HTTP requests containing 'wp_create_user', 'wp_update_user', 'wp_update_option' parameters from non-admin sources

SIEM Query:

source="wordpress.log" AND ("meow_mwai_labs_mcp" OR "wp_create_user" OR "wp_update_user") AND user_role!="administrator"

🔗 References

📤 Share & Export