CVE-2025-5570
📋 TL;DR
The AI Engine WordPress plugin has a stored cross-site scripting vulnerability in the mwai_chatbot shortcode's 'id' parameter. Authenticated attackers with Subscriber-level access or higher can inject malicious scripts that execute when users view compromised pages. This affects all WordPress sites using AI Engine plugin versions up to 2.8.4.
💻 Affected Systems
- AI Engine WordPress Plugin
📦 What is this software?
Ai Engine by Meowapps
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal admin credentials, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.
Likely Case
Attackers with subscriber accounts inject malicious scripts to steal session cookies or redirect users to phishing pages.
If Mitigated
With proper input validation and output escaping, the vulnerability would be prevented entirely.
🎯 Exploit Status
Requires authenticated access (Subscriber role minimum). Exploitation is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.8.5 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.5/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find AI Engine plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.8.5+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable AI Engine Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate ai-engine
Restrict User Registration
allDisable new user registration to prevent attackers from obtaining Subscriber accounts.
wp option update users_can_register 0
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block XSS payloads in POST/GET parameters
- Review and audit all user accounts with Subscriber role or higher for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for AI Engine version. If version is 2.8.4 or lower, you are vulnerable.
Check Version:
wp plugin get ai-engine --field=version
Verify Fix Applied:
After updating, verify AI Engine plugin version shows 2.8.5 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to WordPress containing script tags in parameters
- Multiple failed login attempts followed by successful Subscriber-level login
Network Indicators:
- HTTP requests with JavaScript payloads in 'id' parameter
- Unusual outbound connections from WordPress server after page views
SIEM Query:
source="wordpress" AND (http_uri="*mwai_chatbot*" OR http_params="*<script>*")