CVE-2024-6451

AI Engine < 2.4.3 is susceptible to remote-code-execution (RCE) via Log Poisoning. The AI Engine WordPress plugin before 2.5.1 fails to validate the file extension of "logs_path", allowing Administrators to change log filetypes from .log to .php.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*

History

27 May 2025, 21:05

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fc06d413-a227-470c-a5b7-cdab57aeab34/ - () https://wpscan.com/vulnerability/fc06d413-a227-470c-a5b7-cdab57aeab34/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*
CWE CWE-532
First Time Meowapps ai Engine
Meowapps

19 Aug 2024, 17:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) AI Engine &lt; 2.4.3 es susceptible a la ejecución remota de código (RCE) a través del envenenamiento de registros. El complemento AI Engine WordPress anterior a 2.5.1 no valida la extensión de archivo "logs_path", lo que permite a los administradores cambiar los tipos de archivos de registro de .log a .php.

19 Aug 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-19 06:15

Updated : 2025-05-27 21:05


NVD link : CVE-2024-6451

Mitre link : CVE-2024-6451

CVE.ORG link : CVE-2024-6451


JSON object : View

Products Affected

meowapps

  • ai_engine
CWE
CWE-532

Insertion of Sensitive Information into Log File