# WPBookit <= 1.0.4 - 未认证任意文件上传漏洞
## 漏洞概述
WPBookit插件在WordPress中存在任意文件上传漏洞,这是由于`image_upload_handle()`函数中缺少文件类型验证。攻击者可以上传任意文件,这可能导致远程代码执行。
## 影响版本
所有版本,包括1.0.4及之前的版本
## 漏洞细节
`image_upload_handle()`函数在处理上传文件时,没有正确验证文件类型,该函数通过`'add_booking_type'`路由触发。因此,未经身份验证的攻击者可以利用此漏洞上传任意文件到服务器。
## 影响
攻击者可以上传包含恶意代码的文件,进而可能导致远程代码执行。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload | https://github.com/Nxploited/CVE-2025-6058 | POC详情 |
2 | None | https://github.com/JayVillain/Scan-CVE-2025-6058 | POC详情 |
3 | The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-6058.yaml | POC详情 |
4 | WordPress WPBookit ≤ 1.0.4 Unauthenticated File Upload Exploit | https://github.com/0xgh057r3c0n/CVE-2025-6058 | POC详情 |
标题: class.wpb-booking-type-controller.php in wpbookit/trunk/core/admin/classes/controllers – WordPress Plugin Repository -- 🔗来源链接
标签:
神龙速读暂无评论