Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| aonetheme | Service Finder Bookings | * ~ 6.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An mini exploit for the Service Finder -Bookings plugin WP | https://github.com/M4rgs/CVE-2025-5947_Exploit | POC Details |
| 2 | None | https://github.com/NightlyAudit/CVE-2025-5947 | POC Details |
| 3 | Service Finder Bookings WordPress plugin <= 6.0 contains a privilege escalation caused by improper validation of user cookie in service_finder_switch_back() function, letting unauthenticated attackers login as any user including admins. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5947.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet