Operator note

100K WordPress sites exposed by AI Engine bug - is your plugin patched yet?

AI Engine versions 2.9.3-2.9.4 let any subscriber upload any file, risking RCE. Discover how 2.9.5 shuts the door and what to verify now.

Worried site admin notices unlocked plugin with vulnerability and patch options

A high-severity security flaw in the AI Engine WordPress plugin exposed more than 100,000 websites to authenticated arbitrary file uploads. The issue, disclosed by Wordfence on 14 July 2025, affects versions 2.9.3 and 2.9.4. The developer released a patched build, version 2.9.5, the same day.

AI Engine WordPress Plugin Vulnerability

Wordfence assigned the flaw a CVSS 3.1 base score of 8.8. Any logged-in user with the low-privilege subscriber role can upload files of any type through the plugin’s REST API, potentially leading to remote code execution.

Key details

  • Affected software: AI Engine plugin for WordPress
  • Vulnerable releases: 2.9.3 and 2.9.4
  • Active installations: about 100,000 (WordPress.org)
  • Weakness category: authenticated arbitrary file upload
  • Minimum required access: subscriber, if REST API is enabled
  • Technical cause: missing MIME-type validation inside a REST API helper function
  • Reported to vendor: 11 July 2025
  • Public advisory: 14 July 2025
  • Patch: version 2.9.5 adds strict file checks and URL-scheme validation
  • CVSS score: 8.8 (high)
  • Previous 2025 advisories: four earlier plugin flaws, three in July and one in June
  • 2024 history: nine disclosed issues, including a 9.8-rated unauthenticated upload bug

Version 2.9.5 is now live in the WordPress plugin directory. Sites with automatic updates enabled received the fix within hours of publication.

Background Context

The AI Engine plugin integrates large-language-model features such as content generation and audio transcription. Its architecture relies on custom REST routes that accept media files and external URLs. When file-type checks are absent, attackers can upload executable PHP or shell scripts.

Subscriber-level exploits are particularly risky for membership, forum, and e-commerce sites that let visitors create basic accounts. Attackers can automate account creation and file upload in a single chain, bypassing moderating controls.

AI Engine’s latest disclosure is its fifth in 2025. The repeated incidents reflect a wider issue: Wordfence logged more than 4,000 plugin vulnerabilities across the WordPress ecosystem in 2024. Core mitigations such as the wp_check_filetype_and_ext function exist but rely on correct implementation by plugin authors.

Source Citations

Keep reading

Related articles

AI powered shopping cart protocol illustration with funnel price tag alert loyalty user tapping toggleInside Google's Universal Commerce Protocol that lets AI agents tap carts, catalogs and loyalty pricing2 min readMinimalist illustration of AI checkout hub with Cart Catalog Identity cards and user tapping settingsGoogle quietly upgrades AI shopping protocol: what Cart, Catalog and Identity Linking change next2 min readMinimalist tablet health UI privacy risk toggle character adjusting shield and prescription funnelGoogle and DocMorris Launch AI Health Companion for Europe - What Changes Next2 min readMinimalist site health dashboard illustration with 404 410 toggle funnel filtering errors into green checksWorried About Endless 404 Reports In Search Console? John Mueller Reveals What They Really Mean3 min read