Impact
The AI Engine plugin for WordPress is vulnerable to PHP Object Injection through PHAR deserialization in the 'rest_simpleTranscribeAudio' and 'rest_simpleVisionQuery' functions. An authenticated user with Subscriber level or higher can inject a PHP object, but the plugin itself contains no known Pro‑Object‑Property (POP) chain. As a result, direct code execution, file deletion, or data exfiltration is not possible unless another plugin or theme supplies a POP chain that the injected object can exploit.
Affected Systems
All installations of the AI Engine plugin produced by tigroumeow, version 3.1.8 and earlier, are affected. Users running any of these versions on WordPress should assume the vulnerability is present.
Risk and Exploitability
The CVSS score of 7.1 indicates moderate to high severity, but the EPSS score of less than 1% and the absence from the CISA KEV catalog suggest exploitation is unlikely at this time. Compromise requires both an authenticated Subscriber-level user and a separate plugin or theme that implements a POP chain, so the theoretical impact is limited to environments where such a chain exists. The vulnerability is exposed over the public API endpoints mentioned above, making it potentially reachable by external actors who possess valid subscription credentials.
OpenCVE Enrichment