# Trinity Audio 5.21.0 信息泄露漏洞
## 概述
Trinity Audio – 在 WordPress 中用于将内容转换为音频的插件存在敏感信息泄露漏洞。
## 影响版本
所有版本 **≤ 5.21.0**
## 细节
插件在安装时会创建一个 `~/admin/inc/phpinfo.php` 文件,该文件可被访问并泄露服务器配置信息。
## 影响
未认证攻击者可利用该漏洞提取敏感数据,包括但不限于插件配置信息和服务器环境详情。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Disclosure for CVE-2025-9196 | https://github.com/MooseLoveti/Trinity-Audio-CVE-Report | POC详情 |
| 2 | None | https://github.com/godfatherofexps/CVE-2025-9196-PoC | POC详情 |
| 3 | The Trinity Audio Text to Speech AI audio player to convert content into audio plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.21.0 via the ~/admin/inc/phpinfo.php file that gets created on install. This makes it possible for unauthenticated attackers to extract sensitive data including configuration data. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-9196.yaml | POC详情 |
暂无评论