Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Vibe Coding Platform Hacked

Posted on July 31, 2025July 31, 2025 By CWS

A extreme authentication bypass vulnerability in Base44, a preferred AI-powered vibe coding platform just lately acquired by Wix, may have allowed attackers unauthorized entry to personal enterprise functions and delicate company knowledge.

The vulnerability, which was patched inside 24 hours of disclosure, highlights rising safety considerations within the quickly increasing AI improvement ecosystem.

Key Takeaways1. A essential flaw in Base44 lets anybody entry personal apps utilizing public app IDs.2. Poorly secured APIs uncovered enterprise knowledge to assault.3. The problem was rapidly fastened, but it surely highlights the necessity for higher AI platform safety.

Authentication Bypass Vulnerability

The vulnerability, found by Wiz Analysis, was simple to take advantage of, requiring solely a non-secret app_id worth to achieve full entry to personal functions. 

Attackers may leverage undocumented API endpoints /api/apps/{app_id}/auth/register and /api/apps/{app_id}/auth/verify-otp to create verified accounts for personal functions, successfully bypassing all authentication controls, together with Single Signal-On (SSO) protections.

The app_id values, showing as random strings like 686d0a751a78bb2608517740, have been simply discoverable as they’re hardcoded in software manifest paths at manifests/{app_id}/manifest.json. 

This meant any Base44 software’s identifier was instantly seen in URI paths, making the vulnerability trivial to take advantage of throughout the platform’s complete consumer base.

The safety flaw was uncovered via reconnaissance of Base44’s exterior assault floor, the place researchers recognized publicly accessible Swagger-UI interfaces at app.base44.com and docs.base44.com. 

These interactive API documentation instruments inadvertently uncovered inside authentication endpoints with out correct entry controls.

By inspecting the “auth” APIs part inside the Swagger documentation, researchers recognized that registration endpoints lacked authentication necessities for personal functions configured with SSO-only entry. 

This architectural oversight allowed full circumvention of the platform’s privateness settings via primary API manipulation.

Enterprise Purposes at Danger 

The vulnerability’s influence prolonged past particular person functions because of the vibe coding platforms’ shared infrastructure mannequin, the place all buyer functions inherit the seller’s safety posture.

In the course of the analysis interval, a number of enterprise functions have been confirmed weak, together with inside chatbots, information bases, and HR operations techniques containing personally identifiable data (PII).

The corporate confirmed no proof of malicious exploitation through the weak interval and has since verified that correct validation now prevents unauthorized registration makes an attempt on personal functions.

As vibe coding platforms achieve enterprise adoption for essential enterprise features, strong safety foundations turn into important for safeguarding delicate company knowledge in shared cloud environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Coding, Hacked, Platform, Vibe

Post navigation

Previous Post: BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
Next Post: Free Decryptor Released for AI-Assisted FunkSec Ransomware

Related Posts

How Businesses Prevent Credential Theft with Early Phishing Detection Cyber Security News
Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter Cyber Security News
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems Cyber Security News
System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
Microsoft Unveils European Security Initiative to Target Cybercriminal Networks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
  • Microsoft Boosts .NET Bounty Program Rewards to $40,000
  • Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
  • Microsoft Boosts .NET Bounty Program Rewards to $40,000
  • Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News