CVE-2025-13374
CRITICALCVE-2025-13374 is a critical unauthenticated RCE vulnerability in the Kalrav AI Agent WordPress plugin — any site running version ≤2.3.3 is fully exposed with zero prerequisites for exploitation. An attacker can upload a PHP web shell and achieve full server compromise in under five minutes, with a public PoC already available on GitHub. Immediately disable or remove the plugin; if the server has been internet-exposed since January 2025, treat it as potentially compromised and rotate all AI API keys stored on that host.
Severity & Risk
Recommended Action
- 1. IMMEDIATE: Enumerate all WordPress installations with kalrav-ai-agent plugin ≤2.3.3 across your environment. 2. DISABLE or REMOVE the plugin — no patch is available; do not wait. 3. SCAN webroot and upload directories for recently created .php, .phtml, .phar, or .cgi files (check last 60 days minimum). 4. AUDIT server logs for POST requests to wp-admin/admin-ajax.php with action=kalrav_upload_file — any hit is a confirmed exploitation attempt. 5. ROTATE all AI API keys stored on the affected server (OpenAI, Anthropic, database credentials, Stripe keys). 6. If compromise is confirmed, treat server as fully owned and perform fresh OS-level deployment. 7. As a temporary WAF control if removal is not immediately possible, block multipart/form-data POST requests to the vulnerable AJAX action endpoint.
Classification
Compliance Impact
This CVE is relevant to:
Technical Details
NVD Description
The Kalrav AI Agent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the kalrav_upload_file AJAX action in all versions up to, and including, 2.3.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploitation Scenario
An adversary uses WPScan or Shodan to identify WordPress sites running the Kalrav AI Agent plugin. With a single unauthenticated HTTP POST to /wp-admin/admin-ajax.php?action=kalrav_upload_file, they upload a PHP web shell — no extension validation means any filename works. They browse to the uploaded file URL to gain interactive command execution. Within minutes they extract OpenAI/Anthropic API keys from wp-config.php and server environment variables, dump the WordPress database for user PII, establish persistence via a cron-based reverse shell, and pivot to internal AI services reachable from the server. The full chain requires no credentials, no AI/ML knowledge, and under five minutes of effort.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
- github.com/d0n601/CVE-2025-13374
- plugins.trac.wordpress.org/browser/kalrav-ai-agent/tags/2.3.3/kalrav-ai-agent.php
- plugins.trac.wordpress.org/browser/kalrav-ai-agent/trunk/kalrav-ai-agent.php
- ryankozak.com/posts/cve-2025-13374
- wordfence.com/threat-intel/vulnerabilities/id/5dc8feae-fc89-4152-b9b2-2b70e6ccb30b