Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13374: CWE-434 Unrestricted Upload of File with Dangerous Type in irisideatechsolutions Kalrav AI Agent

0
Critical
VulnerabilityCVE-2025-13374cvecve-2025-13374cwe-434
Published: Sat Jan 24 2026 (01/24/2026, 07:26:42 UTC)
Source: CVE Database V5
Vendor/Project: irisideatechsolutions
Product: Kalrav AI Agent

Description

The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:56:37 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13374 affects the Kalrav AI Agent plugin for WordPress, specifically versions up to and including 2.3.3. The root cause is the lack of proper file type validation in the AJAX action 'kalrav_upload_file', which handles file uploads. This missing validation allows unauthenticated attackers to upload arbitrary files, including potentially malicious scripts, to the web server hosting the WordPress site. Since the upload mechanism is accessible without authentication and requires no user interaction, attackers can remotely exploit this vulnerability over the internet. Successful exploitation can lead to remote code execution (RCE), enabling attackers to execute arbitrary commands on the server, compromise the website, steal sensitive data, or use the server as a foothold for further network intrusion. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), highlighting the risk of dangerous file uploads. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the severity and ease of exploitation make this a high-priority threat. The lack of available patches at the time of reporting increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability is severe. Many businesses and institutions rely on WordPress for their web presence, and the Kalrav AI Agent plugin may be used for AI-driven functionalities. Exploitation could lead to full server compromise, resulting in data breaches, defacement of websites, disruption of services, and potential lateral movement within corporate networks. Sensitive customer data, intellectual property, and internal communications could be exposed or manipulated. The availability of the website or service could be disrupted, causing reputational damage and financial losses. Given the critical CVSS score and the unauthenticated nature of the exploit, attackers can easily target vulnerable sites, increasing the risk of widespread attacks across Europe. The threat is particularly concerning for sectors with high regulatory requirements such as finance, healthcare, and government, where data confidentiality and service availability are paramount.

Mitigation Recommendations

Immediate mitigation steps include disabling the Kalrav AI Agent plugin until a secure patch is released. Organizations should monitor web server logs for unusual file upload activity, especially POST requests to the 'kalrav_upload_file' AJAX endpoint. Implement web application firewalls (WAFs) with custom rules to block or filter suspicious file uploads targeting this endpoint. Restrict file upload permissions on the server to prevent execution of uploaded files, for example by disabling execution rights in upload directories. Employ network segmentation to limit the impact of a compromised web server. Regularly update WordPress core and plugins, and subscribe to vendor security advisories for timely patching. Conduct thorough security audits and penetration tests focusing on file upload functionalities. Educate web administrators about the risks of unrestricted file uploads and the importance of validating file types and content. If patching is not immediately possible, consider using virtual patching techniques via WAFs or reverse proxies to block exploit attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T19:07:07.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974765d4623b1157ca738d2

Added to database: 1/24/2026, 7:35:57 AM

Last enriched: 1/31/2026, 8:56:37 AM

Last updated: 2/7/2026, 9:55:47 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats