# WordPress插件A/B Image Optimizer Plugin <= 3.3 任意文件下载漏洞
## 漏洞概述
Zach Swetz Plugin A/B Image Optimizer 插件存在路径穿越漏洞,其对路径名的限制不当,导致路径遍历攻击。
## 影响版本
从 n/a 到 3.3 版本均受影响。
## 漏洞细节
该漏洞是由于对路径名到受限目录的限制不充分,导致攻击者可能利用路径遍历漏洞访问受限目录之外的文件。
## 影响
攻击者可以利用该漏洞访问或修改受限目录之外的文件,从而可能导致信息泄露、文件篡改等安全问题。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Plugin A/B Image Optimizer <= 3.3 - Authenticated (Subscriber+) Arbitrary File Download | https://github.com/RandomRobbieBF/CVE-2025-25163 | POC详情 |
2 | This repository features a Nuclei template specifically designed to detect the Path Traversal vulnerability (CVE-2025-25163) in the Plugin A/B Image Optimizer for WordPress. This vulnerability poses a critical security risk, allowing unauthorized access to sensitive server files. | https://github.com/rootharpy/CVE-2025-25163-Nuclei-Template | POC详情 |
3 | This repository features a Nuclei template specifically designed to detect the Path Traversal vulnerability (CVE-2025-25163) in the Plugin A/B Image Optimizer for WordPress. This vulnerability poses a critical security risk, allowing unauthorized access to sensitive server files. | https://github.com/RootHarpy/CVE-2025-25163-Nuclei-Template | POC详情 |
标题: WordPress Plugin A/B Image Optimizer Plugin <= 3.3 - Arbitrary File Download vulnerability - Patchstack -- 🔗来源链接
标签: vdb-entry