WordPress Vulnerability Report (Nov 5, 2025)
The report highlights urgent plugin flaws and a snapshot of ecosystem risk.
This update matters for any site owner, developer, or security lead managing live WordPress installations.
Because attackers quickly exploit known gaps, prompt action can prevent breaches.
The report lists 108 public vulnerabilities across plugins and themes.
However, only 77 fixes are available while 31 issues remain unpatched.
You will get clear steps to prioritize updates, apply virtual patches, and harden your sites quickly.
Notably, a critical CVE‑2025‑11749 flaw in the AI Engine plugin earned a CVSS 9.8.
Because the bug exposed the MCP bearer token, attackers could gain administrator level access if left unpatched.
Patch releases, firewall rules, and vendor guidance already reduce immediate risk for many sites.
Read on for a concise risk ranking, a targeted mitigation checklist, and practical step-by-step hardening tips.
Therefore, update affected plugins, rotate exposed tokens, and review firewall rules without delay.
This report gives technical context, recommended priorities, and clear next steps for defenders.
Overview: WordPress vulnerability report (Nov 5, 2025)
This report summarizes current risk across plugins, themes, and core. Because attackers act fast, you must know which issues matter most. Therefore this section highlights high risk flaws and practical priorities.
Key numbers at a glance
- 108 publicly disclosed vulnerabilities were listed in the report. However, only 77 patches are available so far.
- 31 vulnerabilities remain unpatched and need attention from vendors and site owners.
- WordPress 6.8.3 shipped a security update on September 30, 2025. You should apply it if you have not already here.
Major vulnerabilities and impact
- CVE-2025-11749 in the AI Engine plugin is the highest immediate risk. The flaw has a CVSS score of 9.8. It allowed unauthenticated attackers to retrieve the MCP REST API bearer token. As a result, attackers could perform privilege escalation and create administrator accounts. For technical details, see the NVD entry.
- The AI Engine plugin is active on over 100,000 sites. Therefore the exposure surface was large, though the No-Auth URL feature is disabled by default.
- The developer patched the issue in version 3.1.4 on October 19, 2025. Wordfence deployed firewall rules to block exploitation earlier.
Recommended immediate actions
- Update AI Engine to 3.1.4 or later and rotate any exposed MCP tokens without delay.
- Apply WordPress core security updates and review active plugins for available fixes.
- Use virtual patching or a firewall where fixes are delayed. Patchstack and Solid Security Pro offer virtual patching for many vulnerabilities. For more context see the November report by SolidWP.
The rest of this report ranks risk, shows vendor responses, and gives step by step mitigation steps.
Comparison: WordPress vulnerability report (Nov 5, 2025)
| Vulnerability | Description | Possible impact on websites | Affected versions | Recommended mitigation steps |
|---|---|---|---|---|
| CVE-2025-11749 (AI Engine) | Critical flaw exposing the MCP REST API bearer token. Attackers could retrieve the token via an unauthenticated REST endpoint. | Full administrative takeover, privilege escalation, account changes via wp_update_user. | AI Engine versions up to 3.1.3. Patched in 3.1.4. See NVD: NVD CVE-2025-11749 | Update to 3.1.4 or later. Rotate MCP bearer token immediately. Apply firewall rules and monitor logs. |
| No-Auth URL misconfiguration | Optional “No-Auth URL” feature exposed sensitive tokens in URL path when enabled. | Token leakage, unauthenticated API access, session compromise. | AI Engine instances where No-Auth URL was manually enabled before 3.1.4. | Disable No-Auth URL. Update plugin. Rotate any tokens and audit access logs. |
| Multiple plugin and theme flaws | Report lists many plugin and theme CVEs with varied vectors: XSS, RCE, auth bypass. | Site defacement, data theft, malware injection, site takeover depending on the flaw. | Wide range across plugins and themes; 77 patched, 31 unpatched as of Nov 5, 2025. See overview: Solid WP Report | Prioritize high CVSS issues first. Patch where available. Remove unused plugins. Use virtual patching from vendors like Patchstack: Patchstack |
| REST route exposure and show_in_index omission | Missing show_in_index flag made no-auth endpoints visible in some REST registrations. | Unauthenticated discovery of sensitive endpoints, followed by targeted exploits. | Plugins that registered REST routes without show_in_index up to recent patched versions. | Vendor patch to set show_in_index correctly. Restrict REST access and apply WAF rules. |
| WordPress core security issues fixed in 6.8.3 | Core received two security fixes addressing low to high risk issues. | Reduced risk once core is updated; unpatched installs remain exposed to those flaws. | WordPress versions prior to 6.8.3. See release notes: WordPress Release Notes | Update core to 6.8.3+. Test updates on staging. Keep backups and monitor for anomalies. |
Use this table to scan risk quickly, prioritize patches, and apply short term protections such as firewall rules or virtual patches.
Implications and Security Best Practices: WordPress vulnerability report (Nov 5, 2025)
The vulnerabilities highlighted in this report change how site owners and developers must think about risk. Because modern attacks move quickly, small misconfigurations can lead to full site takeovers. Therefore you should treat high CVSS findings and exposed tokens as immediate priorities.
Why this matters
- High impact attack paths exist that allow privilege escalation. For example, CVE‑2025‑11749 exposed the MCP bearer token. Attackers could then call wp_update_user and gain administrator access. As a result, compromised sites can become launchpads for further attacks.
- Large plugin installations amplify risk. Because AI Engine runs on over 100,000 sites, the potential exposure was substantial even though the No‑Auth URL feature is disabled by default.
- Unpatched plugins and themes remain a major vector. With 31 unpatched issues in this report, attackers have targets where vendors have not released fixes yet.
Immediate actions for site owners
- Update everything first. Apply plugin, theme, and core updates, especially AI Engine 3.1.4+ and WordPress 6.8.3. Test updates on staging where possible.
- Rotate exposed credentials. If an MCP bearer token or API key may have leaked, rotate it immediately. Then review recent admin account changes and logs.
- Apply virtual patching or WAF rules. Use firewall rules from vendors like Wordfence or virtual patches from Patchstack when vendor fixes are delayed. See Wordfence blog for rule updates.
Developer and vendor responsibilities
- Validate REST route registrations. Always set show_in_index correctly and avoid exposing no‑auth endpoints in paths.
- Follow secure coding practices. Sanitize inputs, enforce capability checks, and avoid placing secrets in URLs.
- Fast disclosure and patching. Respond quickly to bug reports and provide clear guidance for site owners, including rotation steps for leaked tokens.
Longer term best practices
- Minimize attack surface. Remove unused plugins and themes, and limit active plugins to those you need.
- Use least privilege. Assign administrative rights sparingly and use role based access controls.
- Centralize monitoring and backups. Keep logs centralized, enable alerts for suspicious admin actions, and use reliable backups before updates.
- Use virtual patching services. Solid Security Pro and Patchstack provide virtual patches that protect many sites while vendors prepare releases.
Checklist summary
- Update AI Engine to 3.1.4+ and rotate MCP tokens now.
- Upgrade WordPress core to 6.8.3 or later.
- Apply WAF or virtual patches for unpatched vulnerabilities.
- Audit admin accounts and review logs for unauthorized changes.
- Remove unused plugins and set strict REST registration flags.
By following these steps you reduce immediate risk and improve resilience against future reports like the WordPress vulnerability report (Nov 5, 2025).
Conclusion: WordPress vulnerability report (Nov 5, 2025)
This report shows the ecosystem remains fragile. Because 108 vulnerabilities were disclosed, site owners must act fast. However, 77 patches are available, and vendors are responding. Therefore prioritize updates for high CVSS issues like CVE‑2025‑11749 now.
Staying updated reduces risk dramatically. For example, updating AI Engine to 3.1.4 and rotating exposed MCP tokens closes the critical attack path. Moreover, apply WordPress core fixes, enable firewall rules, and use virtual patching when vendors delay releases. As a result, you limit privilege escalation and reduce the chance of site takeover.
Velocity Plugins builds AI driven WooCommerce tools that also respect security best practices. Visit Velocity Plugins to learn more. Their products increase conversions and cut support costs. In particular, Velocity Chat is the flagship AI chatbot that boosts customer engagement through intelligent responses and automated support.
In short, treat this report as a call to action. Patch urgently, rotate secrets, and harden access controls. Finally, combine good hygiene with smart tooling to stay ahead of attackers.
Frequently Asked Questions (FAQs) — WordPress vulnerability report (Nov 5, 2025)
What is the biggest risk from this report?
Because CVE‑2025‑11749 scored 9.8, it is the most urgent issue. It exposed the MCP REST API bearer token. As a result, attackers could escalate privileges and create administrator accounts. For technical details, see the NVD entry.
How do I know if my site is affected by the AI Engine vulnerability?
Check the AI Engine plugin version on your site. If it runs 3.1.3 or earlier, you were exposed. However, the No‑Auth URL is disabled by default. Therefore only sites that enabled it manually had the greatest risk. Update to 3.1.4 or later and rotate any MCP tokens immediately.
What should I do when a vendor has not yet released a patch?
First, apply virtual patching or WAF rules to block exploit attempts. For example, use Wordfence rules or Patchstack virtual patches to reduce risk quickly. See Wordfence updates and Patchstack. Next, monitor logs and isolate affected systems if you suspect intrusion.
How can I tell if my site was already compromised?
Look for unexpected admin users or recent wp_update_user calls. Also review access logs for strange REST requests. If you find suspicious activity, rotate keys and revoke tokens. Finally, restore from a clean backup and audit the site for backdoors.
What long term steps reduce exposure to similar reports?
Remove unused plugins and themes. Use least privilege for accounts and enforce role based access. Test updates on staging and keep regular backups. In addition, consider virtual patching services and centralized monitoring. For context and a vendor roundup, see this November summary.
If you still have concerns, prioritize patching and token rotation immediately. These actions stop most attack paths described in the WordPress vulnerability report (Nov 5, 2025).


