#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

39 C
Dubai
Saturday, August 2, 2025
HomeTopics 1AI & CybersecurityCVE‑2025‑7847: Arbitrary File Upload in AI Engine Puts 100K+ WordPress Sites at...

CVE‑2025‑7847: Arbitrary File Upload in AI Engine Puts 100K+ WordPress Sites at Risk of RCE

Date:

Related stories

Jordan’s Cyber Incidents Soar: NCC Reports 6,758 Attacks in 2024

On 31 July 2025, Jordan’s National Cybersecurity Center (NCC) revealed that...

Russian FSB‑Linked “Secret Blizzard” Launches ISP‑Level AiTM Campaign Against Moscow Embassies

Microsoft Threat Intelligence has uncovered an advanced cyberespionage campaign...

Allianz Life Suffers Data Breach via External Hack: Consumer Data at Risk

Allianz Life Insurance Company of North America has disclosed...
spot_imgspot_imgspot_imgspot_img

On 18 July 2025, researchers at Wordfence disclosed CVE‑2025‑7847, a high-severity (CVSS 8.8) arbitrary file upload vulnerability in the widely used AI Engine WordPress plugin, affecting versions 2.9.3 and 2.9.4-active on over 100,000 installations. Authenticated users with as little as subscriber-level access could exploit the exposed REST API to upload malicious files, potentially triggering remote code execution. This poses an urgent threat to site integrity globally.

What’s Happened & Timeline of Discovery

DateMilestone
18 July 2025Wordfence received report and validated PoC within hours.
21 July 2025Wordfence Premium, Care & Response users received virtual firewall rules.
22 July 2025Plugin developer released AI Engine version 2.9.5 patching the issue.
20 August 2025Free Wordfence users slated to receive the protections.

Technical Roots of the Vulnerability

The flaw lies in the function rest_simpleFileUpload()-used when Public API is enabled-which lacks file type validation, allowing authenticated attackers to upload arbitrary files, including .php shells, via the REST endpoint. Uploads are saved to the publicly accessible wp-content/uploads/. Wordfence rated the flaw CVSS 8.8, underscoring serious risk.

Impact & Risk Velocity

  • User base affected: Over 100,000 WordPress websites running AI Engine versions 2.9.3 or 2.9.4 with Public API enabled.
  • Exploitability: Requires only subscriber-level access, which is broadly available on most WordPress sites.
  • Potential outcome: Full site takeover via remote code execution; attackers could plant web shells, backdoors, or malicious plug-ins.
  • Additional context: This vulnerability is the fifth high or critical-rated issue in AI Engine discovered in 2025 alone.

Expert Perspectives

“This makes it possible for authenticated attackers, with Subscriber-level access… to upload arbitrary files… which may make remote code execution possible.”
— Wordfence advisory, 18 July 2025

“The AI Engine plugin flaw lets even low-level user accounts escalate to full admin control if misconfigured.”
— Security summarization by SecurityOnline.info

Patch & Mitigation Measures

  • Immediate action: Update AI Engine plugin to version 2.9.5 or newer to close the exploit path.
  • Firewall protection: Wordfence Premium, Care, and Response users received protective firewall rules on 21 July 2025; free users on 20 August 2025.
  • Patch details: The update adds wp_check_filetype() file validation to the rest_simpleFileUpload() function and hardens permissions logic. (Wordfence, 18 July 2025)

4. 10 Practical Security Recommendations

  1. Update now: Ensure all WordPress sites using AI Engine are running v2.9.5 or later.
  2. Disable Public API if unused to eliminate the vulnerable endpoint.
  3. Restrict subscriber-level uploads: only grant REST API file upload capabilities to trusted roles.
  4. Enable WAF rules: apply Wordfence or other web application firewall protections immediately.
  5. Audit upload directories for recent .php files that could indicate compromise.
  6. Review user roles and permissions, minimizing subscriber-level access where possible.
  7. Monitor logs (access, error, REST API activity) for unusual file upload activity.
  8. Segregate admin modules such as Dev Tools and MCP on production sites.
  9. Educate content teams about risks of enabling advanced plugin features.
  10. Subscribe to WordPress security [news, updates, alerts, best practices, trends] to stay proactive: see cybercory.com and for hands-on services check saintynet.com.

5. Conclusion

CVE‑2025‑7847 in AI Engine is a sharp reminder: even authenticated file uploads can lead to full WordPress site takeover if input validation is neglected. With over 100,000 websites affected, swift patching, configuration review, and layered defenses are essential. Administrators must act immediately to mitigate risk and avoid compromise. Vigilance and defense‑in‑depth remain the cornerstone of WordPress security.

Sources

  • Wordfence blog post: 100,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in AI Engine WordPress Plugin – 18 July 2025
  • Feedly CVE summary: CVE‑2025‑7847 – 30 July 2025
  • SearchEngineJournal article: AI Engine Plugin Vulnerability Affects Up To 100,000 Websites – 30 July 2025
  • Heise Online coverage of AI Engine exploit risk – 19 June 2025
Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here