Impact
The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin fails to enforce WordPress capability checks in its MCP OAuth bearer‑token pathway. This missing authorization (CWE‑269) allows any authenticated user possessing a valid OAuth token to access admin‑level MCP functions. The flaw can therefore be used by an attacker with subscriber or lower privileges to elevate their role to Administrator, compromising the integrity of site control without executing arbitrary code.
Affected Systems
The vulnerability is specific to version 3.4.9 of the AI Engine plugin developed by tigroumeow. No other versions or related components are listed as affected, and the issue is limited to the plugin’s MCP OAuth bearer‑token endpoint.
Risk and Exploitability
The likely attack vector is authenticated, requiring possession of a valid OAuth token which is available to any registered WordPress user with a subscription. The CVSS score of 8.8 indicates high severity, but the EPSS score is not available, so the current exploitation probability is unclear. The vulnerability is not listed in the CISA KEV catalog, and no public exploits have yet been reported, yet the absence of role checks provides a relatively low barrier for privilege escalation by attackers with modest access.
OpenCVE Enrichment