Impact
The CIBELES AI WordPress plugin contains an unchecked file‑upload endpoint that allows any visitor to upload arbitrary files, a weakness classified as CWE‑434. Because the plugin can download any GitHub repository and overwrite its own files, an attacker could inject malicious PHP code to gain full control of the site, exfiltrate data, and establish persistence.
Affected Systems
WordPress sites that have installed the CIBELES AI plugin version 1.10.8 or earlier, supplied by the vendor soportecibeles, are affected. These legacy versions are still deployed on many production sites.
Risk and Exploitability
The CVSS score of 9.8 categorizes this defect as Critical, while the EPSS score of less than 1% indicates a low current exploitation probability. The vulnerability can be leveraged by unauthenticated users; if exploited, remote code execution is possible. The plugin is not listed in CISA’s KEV catalog, but the severity warrants high‑priority attention.
OpenCVE Enrichment