{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T21:43:37.907","vulnerabilities":[{"cve":{"id":"CVE-2025-6238","sourceIdentifier":"security@wordfence.com","published":"2025-07-04T03:15:22.237","lastModified":"2025-08-13T19:34:26.383","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The AI Engine plugin for WordPress is vulnerable to open redirect in version 2.8.4. This is due to an insecure OAuth implementation, as the 'redirect_uri' parameter is missing validation during the authorization flow. This makes it possible for unauthenticated attackers to intercept the authorization code and obtain an access token by redirecting the user to an attacker-controlled URI. Note: OAuth is disabled, the 'Meow_MWAI_Labs_OAuth' class is not loaded in the plugin in the patched version 2.8.5."},{"lang":"es","value":"El complemento AI Engine para WordPress es vulnerable a redireccionamientos abiertos en la versión 2.8.4. Esto se debe a una implementación insegura de OAuth, ya que el parámetro 'redirect_uri' no se valida durante el flujo de autorización. Esto permite que atacantes no autenticados intercepten el código de autorización y obtengan un token de acceso redirigiendo al usuario a una URI controlada por el atacante. Nota: OAuth está deshabilitado; la clase 'Meow_MWAI_Labs_OAuth' no está cargada en el complemento en la versión 2.8.5 parcheada."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:meowapps:ai_engine:2.8.4:*:*:*:*:wordpress:*:*","matchCriteriaId":"0673F81D-0896-4346-9CE0-4BB900FFFFE3"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.4/labs/oauth.php","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3321384/ai-engine/trunk/labs/mcp.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://plugins.trac.wordpress.org/changeset/3321384/ai-engine/trunk/labs/oauth.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/1edc84fd-8cb5-4899-9444-1b6ae3144917?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}