Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Vibe Coding Platform Hacked

Posted on July 31, 2025July 31, 2025 By CWS

A extreme authentication bypass vulnerability in Base44, a preferred AI-powered vibe coding platform just lately acquired by Wix, may have allowed attackers unauthorized entry to personal enterprise functions and delicate company knowledge.

The vulnerability, which was patched inside 24 hours of disclosure, highlights rising safety considerations within the quickly increasing AI improvement ecosystem.

Key Takeaways1. A essential flaw in Base44 lets anybody entry personal apps utilizing public app IDs.2. Poorly secured APIs uncovered enterprise knowledge to assault.3. The problem was rapidly fastened, but it surely highlights the necessity for higher AI platform safety.

Authentication Bypass Vulnerability

The vulnerability, found by Wiz Analysis, was simple to take advantage of, requiring solely a non-secret app_id worth to achieve full entry to personal functions. 

Attackers may leverage undocumented API endpoints /api/apps/{app_id}/auth/register and /api/apps/{app_id}/auth/verify-otp to create verified accounts for personal functions, successfully bypassing all authentication controls, together with Single Signal-On (SSO) protections.

The app_id values, showing as random strings like 686d0a751a78bb2608517740, have been simply discoverable as they’re hardcoded in software manifest paths at manifests/{app_id}/manifest.json. 

This meant any Base44 software’s identifier was instantly seen in URI paths, making the vulnerability trivial to take advantage of throughout the platform’s complete consumer base.

The safety flaw was uncovered via reconnaissance of Base44’s exterior assault floor, the place researchers recognized publicly accessible Swagger-UI interfaces at app.base44.com and docs.base44.com. 

These interactive API documentation instruments inadvertently uncovered inside authentication endpoints with out correct entry controls.

By inspecting the “auth” APIs part inside the Swagger documentation, researchers recognized that registration endpoints lacked authentication necessities for personal functions configured with SSO-only entry. 

This architectural oversight allowed full circumvention of the platform’s privateness settings via primary API manipulation.

Enterprise Purposes at Danger 

The vulnerability’s influence prolonged past particular person functions because of the vibe coding platforms’ shared infrastructure mannequin, the place all buyer functions inherit the seller’s safety posture.

In the course of the analysis interval, a number of enterprise functions have been confirmed weak, together with inside chatbots, information bases, and HR operations techniques containing personally identifiable data (PII).

The corporate confirmed no proof of malicious exploitation through the weak interval and has since verified that correct validation now prevents unauthorized registration makes an attempt on personal functions.

As vibe coding platforms achieve enterprise adoption for essential enterprise features, strong safety foundations turn into important for safeguarding delicate company knowledge in shared cloud environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Coding, Hacked, Platform, Vibe

Post navigation

Previous Post: BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
Next Post: Free Decryptor Released for AI-Assisted FunkSec Ransomware

Related Posts

New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
  • CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability
  • Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
  • Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
  • Noma Security Raises $100 Million for AI Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media
  • CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability
  • Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
  • Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
  • Noma Security Raises $100 Million for AI Security Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News