Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Vibe Coding Platform Hacked

Posted on July 31, 2025July 31, 2025 By CWS

A extreme authentication bypass vulnerability in Base44, a preferred AI-powered vibe coding platform just lately acquired by Wix, may have allowed attackers unauthorized entry to personal enterprise functions and delicate company knowledge.

The vulnerability, which was patched inside 24 hours of disclosure, highlights rising safety considerations within the quickly increasing AI improvement ecosystem.

Key Takeaways1. A essential flaw in Base44 lets anybody entry personal apps utilizing public app IDs.2. Poorly secured APIs uncovered enterprise knowledge to assault.3. The problem was rapidly fastened, but it surely highlights the necessity for higher AI platform safety.

Authentication Bypass Vulnerability

The vulnerability, found by Wiz Analysis, was simple to take advantage of, requiring solely a non-secret app_id worth to achieve full entry to personal functions. 

Attackers may leverage undocumented API endpoints /api/apps/{app_id}/auth/register and /api/apps/{app_id}/auth/verify-otp to create verified accounts for personal functions, successfully bypassing all authentication controls, together with Single Signal-On (SSO) protections.

The app_id values, showing as random strings like 686d0a751a78bb2608517740, have been simply discoverable as they’re hardcoded in software manifest paths at manifests/{app_id}/manifest.json. 

This meant any Base44 software’s identifier was instantly seen in URI paths, making the vulnerability trivial to take advantage of throughout the platform’s complete consumer base.

The safety flaw was uncovered via reconnaissance of Base44’s exterior assault floor, the place researchers recognized publicly accessible Swagger-UI interfaces at app.base44.com and docs.base44.com. 

These interactive API documentation instruments inadvertently uncovered inside authentication endpoints with out correct entry controls.

By inspecting the “auth” APIs part inside the Swagger documentation, researchers recognized that registration endpoints lacked authentication necessities for personal functions configured with SSO-only entry. 

This architectural oversight allowed full circumvention of the platform’s privateness settings via primary API manipulation.

Enterprise Purposes at Danger 

The vulnerability’s influence prolonged past particular person functions because of the vibe coding platforms’ shared infrastructure mannequin, the place all buyer functions inherit the seller’s safety posture.

In the course of the analysis interval, a number of enterprise functions have been confirmed weak, together with inside chatbots, information bases, and HR operations techniques containing personally identifiable data (PII).

The corporate confirmed no proof of malicious exploitation through the weak interval and has since verified that correct validation now prevents unauthorized registration makes an attempt on personal functions.

As vibe coding platforms achieve enterprise adoption for essential enterprise features, strong safety foundations turn into important for safeguarding delicate company knowledge in shared cloud environments.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Coding, Hacked, Platform, Vibe

Post navigation

Previous Post: BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
Next Post: Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates

Related Posts

Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News
Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News
Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack Cyber Security News
Fire Ant Hackers Exploiting Vulnerabilities in VMware ESXi and vCenter Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
  • JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
  • Why Data Security and Privacy Need to Start in Code
  • Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
  • User Data Compromised in SoundCloud Hack 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
  • JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
  • Why Data Security and Privacy Need to Start in Code
  • Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
  • User Data Compromised in SoundCloud Hack 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark