Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Vibe Coding Platform Hacked

AI Vibe Coding Platform Hacked

Posted on July 31, 2025July 31, 2025 By CWS

A extreme authentication bypass vulnerability in Base44, a preferred AI-powered vibe coding platform just lately acquired by Wix, may have allowed attackers unauthorized entry to personal enterprise functions and delicate company knowledge.

The vulnerability, which was patched inside 24 hours of disclosure, highlights rising safety considerations within the quickly increasing AI improvement ecosystem.

Key Takeaways1. A essential flaw in Base44 lets anybody entry personal apps utilizing public app IDs.2. Poorly secured APIs uncovered enterprise knowledge to assault.3. The problem was rapidly fastened, but it surely highlights the necessity for higher AI platform safety.

Authentication Bypass Vulnerability

The vulnerability, found by Wiz Analysis, was simple to take advantage of, requiring solely a non-secret app_id worth to achieve full entry to personal functions. 

Attackers may leverage undocumented API endpoints /api/apps/{app_id}/auth/register and /api/apps/{app_id}/auth/verify-otp to create verified accounts for personal functions, successfully bypassing all authentication controls, together with Single Signal-On (SSO) protections.

The app_id values, showing as random strings like 686d0a751a78bb2608517740, have been simply discoverable as they’re hardcoded in software manifest paths at manifests/{app_id}/manifest.json. 

This meant any Base44 software’s identifier was instantly seen in URI paths, making the vulnerability trivial to take advantage of throughout the platform’s complete consumer base.

The safety flaw was uncovered via reconnaissance of Base44’s exterior assault floor, the place researchers recognized publicly accessible Swagger-UI interfaces at app.base44.com and docs.base44.com. 

These interactive API documentation instruments inadvertently uncovered inside authentication endpoints with out correct entry controls.

By inspecting the “auth” APIs part inside the Swagger documentation, researchers recognized that registration endpoints lacked authentication necessities for personal functions configured with SSO-only entry. 

This architectural oversight allowed full circumvention of the platform’s privateness settings via primary API manipulation.

Enterprise Purposes at Danger 

The vulnerability’s influence prolonged past particular person functions because of the vibe coding platforms’ shared infrastructure mannequin, the place all buyer functions inherit the seller’s safety posture.

In the course of the analysis interval, a number of enterprise functions have been confirmed weak, together with inside chatbots, information bases, and HR operations techniques containing personally identifiable data (PII).

The corporate confirmed no proof of malicious exploitation through the weak interval and has since verified that correct validation now prevents unauthorized registration makes an attempt on personal functions.

As vibe coding platforms achieve enterprise adoption for essential enterprise features, strong safety foundations turn into important for safeguarding delicate company knowledge in shared cloud environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Coding, Hacked, Platform, Vibe

Post navigation

Previous Post: BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
Next Post: Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates

Related Posts

Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens Cyber Security News
Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Cyber Security News
Critical SQL Injection Flaw Patched in SAP S/4HANA Critical SQL Injection Flaw Patched in SAP S/4HANA Cyber Security News
Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report Cyber Security News
Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Cyber Security News
CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark