Description
The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.
Problem types
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Product status
* (semver)
Timeline
| 2025-10-14: | Vendor Notified |
| 2025-11-04: | Disclosed |
Credits
Emiliano Versini
References
www.wordfence.com/...-aedf-453d-8457-d03a572fac0d?source=cve
plugins.trac.wordpress.org/...r/ai-engine/trunk/labs/mcp.php
plugins.trac.wordpress.org/changeset/3380753/ai-engine