CVE-2025-11749

CRITICAL EXPLOITED NUCLEI

WordPress AI Engine Plugin MCP Unauthenticated Admin Creation to RCE

Title source: metasploit

Description

The AI Engine plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the /mcp/v1/ REST API endpoint that exposes the 'Bearer Token' value when 'No-Auth URL' is enabled. This makes it possible for unauthenticated attackers to extract the bearer token, which can be used to gain access to a valid session and perform many actions like creating a new administrator account, leading to privilege escalation.

Exploits (4)

nomisec WORKING POC 6 stars
by Nxploited · infoleak
https://github.com/Nxploited/CVE-2025-11749
github WRITEUP 4 stars
by halilkirazkaya · poc
https://github.com/halilkirazkaya/cve-poc-garage/tree/main/2025/CVE-2025-11749.md
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2025-11749
metasploit WORKING POC EXCELLENT
by Emiliano Versini, Khaled Alenazi (Nxploited) · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_ai_engine_mcp_rce.rb

Nuclei Templates (1)

WordPress AI Engine Plugin - Token Exposure
CRITICALVERIFIEDby 4m3rr0r
Shodan: http.html:"/wp-content/plugins/ai-engine/"

Scores

CVSS v3 9.8
EPSS 0.8589
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-11-05

Classification

CWE
CWE-200
Status draft

Timeline

Published Nov 05, 2025
Tracked Since Feb 18, 2026