Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13595: CWE-434 Unrestricted Upload of File with Dangerous Type in soportecibeles CIBELES AI

0
Critical
VulnerabilityCVE-2025-13595cvecve-2025-13595cwe-434
Published: Tue Nov 25 2025 (11/25/2025, 22:28:36 UTC)
Source: CVE Database V5
Vendor/Project: soportecibeles
Product: CIBELES AI

Description

The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 11/25/2025, 23:01:57 UTC

Technical Analysis

CVE-2025-13595 is a critical security vulnerability identified in the CIBELES AI plugin for WordPress, specifically in the 'actualizador_git.php' file present in all versions up to 1.10.8. The vulnerability is classified under CWE-434, which involves unrestricted file upload of dangerous types. The root cause is the absence of a capability check that would normally restrict who can invoke the update functionality. This flaw allows unauthenticated attackers to remotely trigger the download of arbitrary GitHub repositories and overwrite existing plugin files on the server hosting the WordPress site. By overwriting plugin files, attackers can inject malicious code, potentially leading to remote code execution (RCE). The vulnerability is exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. While no public exploits have been reported yet, the ease of exploitation and the severity of impact make this a high-priority issue. The vulnerability affects all versions of the plugin up to 1.10.8, and no official patches or updates have been linked yet, indicating that users must take immediate protective actions. The attack vector involves leveraging the plugin's update mechanism to replace legitimate plugin files with malicious ones, which can then execute arbitrary commands on the server, potentially leading to full site compromise, data theft, or defacement.

Potential Impact

For European organizations, this vulnerability poses a significant threat to WordPress-based websites that utilize the CIBELES AI plugin. Successful exploitation can lead to complete server compromise, allowing attackers to execute arbitrary code, steal sensitive data, deface websites, or use the compromised server as a pivot point for further attacks within the network. This can result in severe reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions. Public-facing websites of government agencies, financial institutions, healthcare providers, and e-commerce platforms in Europe are particularly at risk due to their high visibility and the sensitive nature of their data. The lack of authentication and user interaction requirements means attackers can automate exploitation at scale, increasing the likelihood of widespread attacks. Additionally, the ability to overwrite plugin files can facilitate persistent backdoors, making detection and remediation more challenging. The critical severity and network accessibility make this vulnerability a top priority for incident response and patch management teams in European organizations.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. First, restrict access to the 'actualizador_git.php' file by implementing web application firewall (WAF) rules that block unauthenticated requests to this endpoint. Use IP whitelisting or authentication mechanisms to limit who can invoke plugin update functionality. Monitor web server logs for suspicious requests targeting this script and unusual file modifications within the plugin directory. Employ file integrity monitoring to detect unauthorized changes to plugin files. Disable or remove the CIBELES AI plugin if it is not essential to reduce the attack surface. Ensure that WordPress core, themes, and other plugins are up to date to minimize additional vulnerabilities. Network segmentation can limit the impact of a compromised web server. Finally, prepare for rapid patch deployment once an official fix is released by the vendor. Conduct regular backups of website data and plugin files to enable quick restoration in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T07:27:39.142Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692631dfacb2eea424dd30d8

Added to database: 11/25/2025, 10:46:55 PM

Last enriched: 11/25/2025, 11:01:57 PM

Last updated: 11/26/2025, 1:02:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats