CVE-2025-11749
AI Engine <= 3.1.3 - Unauthenticated Sensitive Information Exposure to Privilege Escalation
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.
| CWE | CWE-200 |
| Vendor | tigroumeow |
| Product | ai engine – the chatbot, ai framework & mcp for wordpress |
| Published | Nov 5, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for tigroumeow ai engine – the chatbot, ai framework & mcp for wordpress
Be the first to know when new critical vulnerabilities affecting tigroumeow ai engine – the chatbot, ai framework & mcp for wordpress are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
tigroumeow / AI Engine – The Chatbot, AI Framework & MCP for WordPress
0 ≤ 3.1.3
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/06eaf624-aedf-453d-8457-d03a572fac0d?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/ai-engine/trunk/labs/mcp.php#L226 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3380753/ai-engine#file10
Credits
Emiliano Versini