Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-2539.yaml | POC Details |
| 2 | File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read | https://github.com/verylazytech/CVE-2025-2539 | POC Details |
| 3 | Unauthenticated Arbitrary File Read exploit for WordPress File Away Plugin ≤ 3.9.9.0.1 | https://github.com/RootHarpy/CVE-2025-2539 | POC Details |
| 4 | CVE-2025-2539 - WordPress File Away <= 3.9.9.0.1 - Arbitrary File Read | https://github.com/Yucaerin/CVE-2025-2539 | POC Details |
| 5 | None | https://github.com/d4rkh0rse/CVE-2025-2539 | POC Details |
| 6 | None | https://github.com/AlvaXPloit/CVE-2025-2539 | POC Details |
| 7 | CVE-2025-2539 - File Away WordPress Plugin Arbitrary File Read | https://github.com/fazaroot/CVE-2025-2539---File-Away-WordPress-Plugin-Arbitrary-File-Read | POC Details |
No public POC found.
Login to generate AI POCNo comments yet