Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-13374 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary File Upload via missing validation in `kalrav_upload_file` AJAX action. πŸ’₯ **Consequences**: Leads to Remote Code Execution (RCE).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-434 (Unrestricted Upload of File with Dangerous Type). The plugin fails to validate file types during the upload process, allowing dangerous extensions.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **Kalrav AI Agent**. **Versions**: 2.3.3 and earlier. **Vendor**: irisideatechsolutions.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: Unauthenticated access required. πŸ“‚ **Data**: Full server control via RCE. High impact on Confidentiality, Integrity, and Availability (CVSS: 9.8).

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. No authentication (PR:N) or user interaction (UI:N) needed. Network accessible (AV:N) with Low complexity (AC:L). Easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit**: YES. Public PoC available on GitHub (d0n601/CVE-2025-13374). Active exploitation is likely given the low barrier to entry.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for `kalrav-ai-agent.php` version <= 2.3.3. Check if the `kalrav_upload_file` AJAX endpoint exists and lacks file type validation logic.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update to the latest version of Kalrav AI Agent. Check vendor release notes for patched versions. Official references provided in WordFence and WP Trac.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable the plugin if not needed. Implement WAF rules to block requests to `kalrav_upload_file` AJAX action. Restrict file upload types at the server level.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. CVSS 9.8 + Unauthenticated + Public PoC = Immediate action required. Patch or mitigate within 24-48 hours.