CVE-2025-13374: Kalrav: Arbitrary File Upload enables RCE
CRITICAL PoC AVAILABLE CISA: TRACK*CVE-2025-13374 is a critical unauthenticated RCE vulnerability in the Kalrav AI Agent WordPress plugin — any site running version ≤2.3.3 is fully exposed with zero prerequisites for exploitation. An attacker can upload a PHP web shell and achieve full server compromise in under five minutes, with a public PoC already available on GitHub. Immediately disable or remove the plugin; if the server has been internet-exposed since January 2025, treat it as potentially compromised and rotate all AI API keys stored on that host.
Risk Assessment
CRITICAL. CVSS 9.8 with network-accessible, zero-authentication, zero-interaction exploitation. The plugin's AJAX handler accepts file uploads without any type or extension validation, meaning any unauthenticated HTTP POST can plant executable code on the server. Exposure is every public-facing WordPress site with the plugin installed — no scanning, fingerprinting, or credential acquisition needed. A working PoC (github.com/d0n601/CVE-2025-13374) is already public, making mass exploitation by unsophisticated attackers highly likely.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
IMMEDIATE
Enumerate all WordPress installations with kalrav-ai-agent plugin ≤2.3.3 across your environment.
-
DISABLE or REMOVE the plugin — no patch is available; do not wait.
-
SCAN webroot and upload directories for recently created .php, .phtml, .phar, or .cgi files (check last 60 days minimum).
-
AUDIT server logs for POST requests to wp-admin/admin-ajax.php with action=kalrav_upload_file — any hit is a confirmed exploitation attempt.
-
ROTATE all AI API keys stored on the affected server (OpenAI, Anthropic, database credentials, Stripe keys).
-
If compromise is confirmed, treat server as fully owned and perform fresh OS-level deployment.
-
As a temporary WAF control if removal is not immediately possible, block multipart/form-data POST requests to the vulnerable AJAX action endpoint.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-13374?
CVE-2025-13374 is a critical unauthenticated RCE vulnerability in the Kalrav AI Agent WordPress plugin — any site running version ≤2.3.3 is fully exposed with zero prerequisites for exploitation. An attacker can upload a PHP web shell and achieve full server compromise in under five minutes, with a public PoC already available on GitHub. Immediately disable or remove the plugin; if the server has been internet-exposed since January 2025, treat it as potentially compromised and rotate all AI API keys stored on that host.
Is CVE-2025-13374 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2025-13374, increasing the risk of exploitation.
How to fix CVE-2025-13374?
1. IMMEDIATE: Enumerate all WordPress installations with kalrav-ai-agent plugin ≤2.3.3 across your environment. 2. DISABLE or REMOVE the plugin — no patch is available; do not wait. 3. SCAN webroot and upload directories for recently created .php, .phtml, .phar, or .cgi files (check last 60 days minimum). 4. AUDIT server logs for POST requests to wp-admin/admin-ajax.php with action=kalrav_upload_file — any hit is a confirmed exploitation attempt. 5. ROTATE all AI API keys stored on the affected server (OpenAI, Anthropic, database credentials, Stripe keys). 6. If compromise is confirmed, treat server as fully owned and perform fresh OS-level deployment. 7. As a temporary WAF control if removal is not immediately possible, block multipart/form-data POST requests to the vulnerable AJAX action endpoint.
What systems are affected by CVE-2025-13374?
This vulnerability affects the following AI/ML architecture patterns: WordPress AI agent deployments, Plugin-based AI chatbot integrations, Web-hosted model inference frontends, AI agent frameworks with web interfaces, Server-side RAG pipelines accessible from compromised WordPress host.
What is the CVSS score for CVE-2025-13374?
CVE-2025-13374 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 0.09%.
Technical Details
NVD Description
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploitation Scenario
An adversary uses WPScan or Shodan to identify WordPress sites running the Kalrav AI Agent plugin. With a single unauthenticated HTTP POST to /wp-admin/admin-ajax.php?action=kalrav_upload_file, they upload a PHP web shell — no extension validation means any filename works. They browse to the uploaded file URL to gain interactive command execution. Within minutes they extract OpenAI/Anthropic API keys from wp-config.php and server environment variables, dump the WordPress database for user PII, establish persistence via a cron-based reverse shell, and pivot to internal AI services reachable from the server. The full chain requires no credentials, no AI/ML knowledge, and under five minutes of effort.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/d0n601/CVE-2025-13374
- plugins.trac.wordpress.org/browser/kalrav-ai-agent/tags/2.3.3/kalrav-ai-agent.php
- plugins.trac.wordpress.org/browser/kalrav-ai-agent/trunk/kalrav-ai-agent.php
- ryankozak.com/posts/cve-2025-13374
- wordfence.com/threat-intel/vulnerabilities/id/5dc8feae-fc89-4152-b9b2-2b70e6ccb30b
Timeline
Related Vulnerabilities
CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Extraction CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Code Execution CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same attack type: Code Execution
AI Threat Alert