Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 05 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 05 Nov 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation. | |
| Title | AI Engine <= 3.1.3 - Unauthenticated Sensitive Information Exposure to Privilege Escalation | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:33:50.495Z
Reserved: 2025-10-14T15:04:46.388Z
Link: CVE-2025-11749
Updated: 2025-11-05T14:18:11.780Z
Status : Deferred
Published: 2025-11-05T06:15:33.097
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11749
No data.
OpenCVE Enrichment
Updated: 2026-04-27T23:00:13Z