CVE-2026-0746 Overview
The AI Engine plugin for WordPress contains a Server-Side Request Forgery (SSRF) vulnerability in all versions up to and including 3.3.2. The flaw exists within the get_audio function, allowing authenticated attackers with Subscriber-level access or higher to make arbitrary web requests originating from the web application server. This vulnerability can be leveraged to query and modify information from internal services when specific conditions are met.
Critical Impact
Authenticated attackers can abuse this SSRF vulnerability to access internal network resources, potentially exposing sensitive configuration data, internal APIs, and cloud metadata services that should not be externally accessible.
Affected Products
- AI Engine plugin for WordPress versions up to and including 3.3.2
- WordPress installations with AI Engine plugin where "Public API" is enabled
- Servers with PHP configuration allow_url_fopen set to On
Discovery Timeline
- 2026-01-27 - CVE-2026-0746 published to NVD
- 2026-01-29 - Last updated in NVD database
Technical Details for CVE-2026-0746
Vulnerability Analysis
This vulnerability is classified as CWE-918 (Server-Side Request Forgery). The SSRF flaw allows authenticated users to craft malicious requests that the server will execute on their behalf, effectively using the WordPress installation as a proxy to access internal resources.
The vulnerability requires specific conditions to be exploitable: the "Public API" feature must be enabled in the plugin settings, and the PHP server configuration must have allow_url_fopen set to On. When these conditions are met, attackers with even minimal authentication (Subscriber-level) can exploit this weakness.
The scope of this vulnerability extends beyond the vulnerable component itself, potentially allowing attackers to pivot to other internal systems and services that trust requests from the web server's IP address.
Root Cause
The root cause lies in the get_audio function within the chatml.php file, which fails to properly validate and sanitize user-supplied URLs before making server-side requests. The function does not implement adequate restrictions on the destination of outbound requests, allowing attackers to specify arbitrary URLs including internal network addresses.
Attack Vector
The attack is network-based and requires low-privileged authentication (Subscriber-level access). An attacker would craft a malicious request to the get_audio function endpoint, specifying an internal URL as the target. The server would then make the request on behalf of the attacker, potentially returning sensitive data from internal services.
Common attack scenarios include:
- Accessing cloud metadata endpoints (e.g., http://169.254.169.254/) to retrieve instance credentials
- Scanning internal network services to map infrastructure
- Accessing internal APIs and administrative interfaces
- Reading configuration files from internal web services
The vulnerability mechanism involves the get_audio function accepting user-controlled input for URL destinations without proper validation. When the "Public API" feature is enabled and PHP's allow_url_fopen directive permits URL file access, the function will fetch content from arbitrary locations. For detailed technical analysis, refer to the WordPress Plugin Code Review and the Wordfence Vulnerability Analysis.
Detection Methods for CVE-2026-0746
Indicators of Compromise
- Unusual outbound requests from the WordPress server to internal IP ranges (10.x.x.x, 172.16.x.x-172.31.x.x, 192.168.x.x)
- Web server logs showing requests to cloud metadata endpoints (169.254.169.254)
- Unexpected API calls to the AI Engine plugin endpoints from Subscriber-level accounts
- Anomalous network traffic patterns from the web server to internal services
Detection Strategies
- Monitor web application firewall (WAF) logs for requests containing internal IP addresses or localhost references in URL parameters
- Implement network segmentation monitoring to detect unauthorized internal communications from web servers
- Review WordPress activity logs for unusual API endpoint usage by low-privileged users
- Deploy intrusion detection rules for common SSRF payloads targeting cloud metadata services
Monitoring Recommendations
- Configure alerts for outbound connections from web servers to internal network segments
- Implement logging for all AI Engine plugin API calls, including the requesting user and target URLs
- Monitor for enumeration patterns that may indicate internal network scanning
- Enable verbose PHP logging to capture URL fetch operations
How to Mitigate CVE-2026-0746
Immediate Actions Required
- Update the AI Engine plugin to a version newer than 3.3.2 immediately
- Disable the "Public API" feature in AI Engine plugin settings if not required
- Review and audit Subscriber-level accounts for suspicious activity
- Implement network-level controls to restrict outbound requests from web servers
Patch Information
The vulnerability has been addressed in versions after 3.3.2. The patch can be reviewed in the WordPress Plugin Changeset. Administrators should update through the WordPress plugin management interface or by manually downloading the latest version from the WordPress plugin repository.
Workarounds
- Set PHP configuration allow_url_fopen to Off if application functionality permits
- Implement web application firewall rules to block SSRF payloads in requests
- Restrict Subscriber-level users from accessing plugin API endpoints through WordPress capability management
- Deploy network egress filtering to prevent the web server from making requests to internal networks
# Configuration example
# Disable allow_url_fopen in php.ini to mitigate SSRF risk
# Edit /etc/php/8.x/apache2/php.ini (path may vary)
allow_url_fopen = Off
# Alternative: Add to .htaccess for per-directory restriction
php_flag allow_url_fopen off
# Restart web server after changes
sudo systemctl restart apache2
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


