Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13595: CWE-434 Unrestricted Upload of File with Dangerous Type in soportecibeles CIBELES AI

0
Critical
VulnerabilityCVE-2025-13595cvecve-2025-13595cwe-434
Published: Tue Nov 25 2025 (11/25/2025, 22:28:36 UTC)
Source: CVE Database V5
Vendor/Project: soportecibeles
Product: CIBELES AI

Description

The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/02/2025, 23:39:01 UTC

Technical Analysis

CVE-2025-13595 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the CIBELES AI plugin for WordPress, developed by soportecibeles. The vulnerability stems from a missing capability check in the 'actualizador_git.php' file, which is responsible for updating the plugin via GitHub repositories. Due to this missing check, unauthenticated attackers can invoke this update mechanism to download arbitrary GitHub repositories and overwrite existing plugin files on the affected WordPress server. This arbitrary file upload capability can be leveraged to inject malicious code, leading to remote code execution (RCE) on the server hosting the WordPress site. The vulnerability affects all versions up to and including 1.10.8, making it widespread among users of this plugin. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network attack vector, no privileges or user interaction required). Although no known exploits have been reported in the wild yet, the vulnerability's nature and severity make it a prime target for attackers. The plugin’s update mechanism is intended to facilitate legitimate updates, but the lack of proper authorization checks allows attackers to misuse this functionality to compromise the server. This vulnerability could lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.

Potential Impact

For European organizations, the impact of CVE-2025-13595 is significant. Many businesses and institutions rely on WordPress for their public websites, and the CIBELES AI plugin may be used for AI-related functionalities. Exploitation could result in complete site takeover, data breaches involving sensitive customer or organizational data, and disruption of services. The ability to execute arbitrary code remotely could allow attackers to install backdoors, ransomware, or use the compromised server to launch attacks on other internal or external targets. This could lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational downtime. Organizations with limited cybersecurity resources or those slow to apply updates are particularly vulnerable. Additionally, the vulnerability could be exploited to deface websites or spread misinformation, which is a concern for public sector and media organizations. The lack of authentication requirement increases the risk of automated mass scanning and exploitation attempts, potentially affecting a broad range of European entities.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the CIBELES AI plugin until a patch is available. Organizations should monitor official vendor channels for security updates and apply patches as soon as they are released. In the absence of a patch, restricting access to the 'actualizador_git.php' file via web server configuration (e.g., using .htaccess rules or firewall rules) to block unauthenticated requests can reduce risk. Implementing Web Application Firewalls (WAF) with custom rules to detect and block suspicious requests targeting this file is recommended. Regularly auditing WordPress plugins and removing unused or unsupported plugins reduces attack surface. Organizations should also conduct integrity checks on plugin files to detect unauthorized modifications. Network segmentation and limiting server permissions can help contain potential damage. Finally, monitoring logs for unusual activity related to plugin updates or file modifications can provide early detection of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T07:27:39.142Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692631dfacb2eea424dd30d8

Added to database: 11/25/2025, 10:46:55 PM

Last enriched: 12/2/2025, 11:39:01 PM

Last updated: 1/10/2026, 10:16:09 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats