尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| glenwpcoder | Drag and Drop Multiple File Upload for Contact Form 7 | * ~ 1.3.8.9 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE‑2025‑3515 — Drag and Drop Multiple File Upload for Contact Form 7 | https://github.com/Professor6T9/CVE-2025-3515 | POC详情 |
| 2 | WordPress File Upload RCE Exploit | https://github.com/blueisbeautiful/CVE-2025-3515 | POC详情 |
| 3 | CVE-2025-3515 WordPress lab for Drag and Drop Multiple File Upload for CF7: Dockerized PoC & Nuclei testing | https://github.com/ImBIOS/lab-cve-2025-3515 | POC详情 |
| 4 | The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attackers to bypass the plugin's blacklist and upload .phar or other dangerous file types on the affected site's server, which may make remote code execution possible on the servers that are configured to handle .phar files as executable PHP scripts, particularly in default Apache+mod_php configurations where the file extension is not strictly validated before being passed to the PHP interpreter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-3515.yaml | POC详情 |
| 5 | 🛠️ Reproduce and validate CVE-2025-3515 in a Dockerized WordPress lab to test unrestricted file uploads via the Contact Form 7 plugin. | https://github.com/MrSoules/lab-cve-2025-3515 | POC详情 |
| 6 | WordPress File Upload RCE Exploit | https://github.com/brokendreamsclub/CVE-2025-3515 | POC详情 |
| 7 | 🛠️ Reproduce and validate CVE-2025-3515 by setting up a Dockerized WordPress lab for testing unrestricted file uploads in a vulnerable plugin. | https://github.com/robertskimengote/lab-cve-2025-3515 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论