Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13374: CWE-434 Unrestricted Upload of File with Dangerous Type in irisideatechsolutions Kalrav AI Agent

0
Critical
VulnerabilityCVE-2025-13374cvecve-2025-13374cwe-434
Published: Sat Jan 24 2026 (01/24/2026, 07:26:42 UTC)
Source: CVE Database V5
Vendor/Project: irisideatechsolutions
Product: Kalrav AI Agent

Description

CVE-2025-13374 is a critical vulnerability in the Kalrav AI Agent WordPress plugin that allows unauthenticated attackers to upload arbitrary files due to missing file type validation. This flaw exists in all versions up to 2. 3. 3 and can lead to remote code execution on the affected server. The vulnerability is exploitable over the network without authentication or user interaction, making it highly dangerous. Although no known exploits are reported in the wild yet, the high CVSS score of 9. 8 reflects its severe impact on confidentiality, integrity, and availability. European organizations using this plugin on WordPress sites are at significant risk, especially those in countries with high WordPress adoption and targeted by cybercriminals. Immediate mitigation involves restricting file upload permissions, implementing strict file type validation, and monitoring for suspicious activity. Patch availability is currently not indicated, so defensive measures and plugin updates should be prioritized once released.

AI-Powered Analysis

AILast updated: 01/24/2026, 07:50:41 UTC

Technical Analysis

CVE-2025-13374 is a critical security vulnerability identified in the Kalrav AI Agent plugin for WordPress, developed by irisideatechsolutions. The vulnerability stems from the plugin's failure to validate file types in the kalrav_upload_file AJAX action, allowing unauthenticated attackers to upload arbitrary files to the server. This unrestricted file upload (classified under CWE-434) can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. Uploaded malicious files could enable remote code execution (RCE), compromising the server's confidentiality, integrity, and availability. The vulnerability affects all plugin versions up to and including 2.3.3. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a critical severity with network attack vector, low attack complexity, no privileges or user interaction required, and full impact on system security properties. Although no exploits have been reported in the wild yet, the potential for severe damage is high. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate defensive actions. The vulnerability is particularly concerning for WordPress sites using this plugin, as attackers could gain full control over the web server, potentially leading to data breaches, site defacement, or use of the server for further attacks.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially those relying on WordPress websites with the Kalrav AI Agent plugin installed. Successful exploitation can lead to complete server compromise, exposing sensitive data, disrupting services, and damaging organizational reputation. The ability to execute arbitrary code remotely without authentication increases the risk of widespread attacks, including ransomware deployment, data exfiltration, or pivoting within internal networks. Given the widespread use of WordPress across Europe, sectors such as e-commerce, government, healthcare, and finance could be targeted. The impact is exacerbated in countries with high WordPress market penetration and where cybercriminal activity is prevalent. Additionally, organizations with limited cybersecurity resources or delayed patch management processes face higher risks. The vulnerability could also be leveraged in supply chain attacks if exploited on third-party service providers hosting WordPress sites for multiple clients.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting the kalrav_upload_file AJAX action if possible, to prevent file uploads until a patch is available. Implement strict server-side file type validation and filtering to block dangerous file extensions and MIME types. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting this vulnerability. Regularly monitor web server logs and WordPress activity for unusual file uploads or execution patterns. Limit file upload permissions to the minimum necessary and isolate upload directories with restrictive permissions to prevent execution of uploaded files. Maintain up-to-date backups of affected sites to enable rapid recovery. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. Additionally, conduct security audits of WordPress installations to identify and remediate similar vulnerabilities. Educate site administrators on secure plugin management and the risks of using outdated or untrusted plugins.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T19:07:07.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974765d4623b1157ca738d2

Added to database: 1/24/2026, 7:35:57 AM

Last enriched: 1/24/2026, 7:50:41 AM

Last updated: 1/24/2026, 10:10:33 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats