Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Vibe Coding Platform Hacked

Posted on July 31, 2025July 31, 2025 By CWS

A extreme authentication bypass vulnerability in Base44, a preferred AI-powered vibe coding platform just lately acquired by Wix, may have allowed attackers unauthorized entry to personal enterprise functions and delicate company knowledge.

The vulnerability, which was patched inside 24 hours of disclosure, highlights rising safety considerations within the quickly increasing AI improvement ecosystem.

Key Takeaways1. A essential flaw in Base44 lets anybody entry personal apps utilizing public app IDs.2. Poorly secured APIs uncovered enterprise knowledge to assault.3. The problem was rapidly fastened, but it surely highlights the necessity for higher AI platform safety.

Authentication Bypass Vulnerability

The vulnerability, found by Wiz Analysis, was simple to take advantage of, requiring solely a non-secret app_id worth to achieve full entry to personal functions. 

Attackers may leverage undocumented API endpoints /api/apps/{app_id}/auth/register and /api/apps/{app_id}/auth/verify-otp to create verified accounts for personal functions, successfully bypassing all authentication controls, together with Single Signal-On (SSO) protections.

The app_id values, showing as random strings like 686d0a751a78bb2608517740, have been simply discoverable as they’re hardcoded in software manifest paths at manifests/{app_id}/manifest.json. 

This meant any Base44 software’s identifier was instantly seen in URI paths, making the vulnerability trivial to take advantage of throughout the platform’s complete consumer base.

The safety flaw was uncovered via reconnaissance of Base44’s exterior assault floor, the place researchers recognized publicly accessible Swagger-UI interfaces at app.base44.com and docs.base44.com. 

These interactive API documentation instruments inadvertently uncovered inside authentication endpoints with out correct entry controls.

By inspecting the “auth” APIs part inside the Swagger documentation, researchers recognized that registration endpoints lacked authentication necessities for personal functions configured with SSO-only entry. 

This architectural oversight allowed full circumvention of the platform’s privateness settings via primary API manipulation.

Enterprise Purposes at Danger 

The vulnerability’s influence prolonged past particular person functions because of the vibe coding platforms’ shared infrastructure mannequin, the place all buyer functions inherit the seller’s safety posture.

In the course of the analysis interval, a number of enterprise functions have been confirmed weak, together with inside chatbots, information bases, and HR operations techniques containing personally identifiable data (PII).

The corporate confirmed no proof of malicious exploitation through the weak interval and has since verified that correct validation now prevents unauthorized registration makes an attempt on personal functions.

As vibe coding platforms achieve enterprise adoption for essential enterprise features, strong safety foundations turn into important for safeguarding delicate company knowledge in shared cloud environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Coding, Hacked, Platform, Vibe

Post navigation

Previous Post: BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
Next Post: Free Decryptor Released for AI-Assisted FunkSec Ransomware

Related Posts

Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
Adobe’s August 2025 Patch Tuesday Cyber Security News
PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309) Cyber Security News
UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS Cyber Security News
Cyber Attacks Targeting Education Sector Surges Following Back-to-School Season Cyber Security News
Darknet Market Archetyp Dismantled by Authorities in Joint Action ‘Operation Deep Sentinel’ Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Terra Security Raises $30 Million for AI Penetration Testing Platform
  • BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies
  • Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems
  • 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
  • Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Terra Security Raises $30 Million for AI Penetration Testing Platform
  • BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies
  • Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems
  • 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
  • Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News