AI Engine – The Chatbot, AI Framework & MCP for WordPress Vulnerabi…

AI Engine – The Chatbot, AI Framework & MCP for WordPress Vulnerabi…

by | Mar 5, 2026 | Plugins

Attack Vectors

CVE-2026-23802 is a High severity vulnerability (CVSS 7.2) affecting AI Engine – The Chatbot, AI Framework & MCP for WordPress (slug: ai-engine) in versions up to and including 3.3.2. The issue is an authenticated (Editor+) arbitrary file upload, meaning an attacker must be logged in with Editor-level access (or higher) to exploit it.

In practical business terms, this is most likely to be abused through compromised staff credentials, a hijacked Editor account, an insider threat, or a third-party agency/vendor account with elevated WordPress permissions. Once an attacker has that level of access, they can attempt to upload files that the site should never accept, potentially leading to deeper compromise.

Security Weakness

The vulnerability is caused by missing file type validation in the plugin’s upload functionality (in all affected versions up to 3.3.2). When a system does not properly restrict what file types can be uploaded, attackers can place unexpected files onto the web server.

According to the public advisory, the impact of arbitrary file upload is especially serious because it may make remote code execution possible. For leadership and compliance teams, the key point is that “upload” can become “take control,” depending on server configuration and what the attacker uploads.

Technical or Business Impacts

If exploited, this High severity issue can create direct operational and reputational risk. Potential outcomes include website defacement, malware distribution to your visitors, unauthorized access to sensitive content, disruption of online lead generation, and unplanned downtime that affects campaigns, sales, and customer trust.

From a business and compliance perspective, successful compromise can also trigger incident response costs, regulatory or contractual reporting obligations, and brand damage—particularly if the site handles customer data, runs ecommerce, or supports regulated marketing activities. The recommended remediation is straightforward: update AI Engine to version 3.3.3 or newer (patched) as advised by the source.

Similar Attacks

Arbitrary file upload issues have been used in real-world WordPress-related compromises because they can be a fast path to full site takeover. Relevant examples include:

File Manager plugin vulnerability (Wordfence) — file upload leading to widespread exploitation

CVE-2019-9978 (Social Warfare) — WordPress plugin vulnerability tracked in NVD

CVE-2018-19207 (WP GDPR Compliance) — WordPress plugin vulnerability tracked in NVD

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers