Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-12539 PoC — WordPress plugin TNC Toolbox Web Performance 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin TNC Toolbox Web Performance 安全漏洞 (CVE-2025-12539)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin TNC Toolbox Web Performance 1.4.2及之前版本存在安全漏洞,该漏洞源于存储cPanel API凭据时缺乏足够保护,可能导致敏感信息泄露和远程代码执行。
Description
TNC Toolbox: Web Performance <= 1.4.2 - Unauthenticated Sensitive Information Exposure to Privilege Escalation/cPanel Account Takeover
Readme
# CVE-2025-12539
TNC Toolbox: Web Performance &lt;= 1.4.2 - Unauthenticated Sensitive Information Exposure to Privilege Escalation/cPanel Account Takeover

# 🚨 TNC Toolbox: Web Performance <= 1.4.2 - Unauthenticated Sensitive Information Exposure to Privilege Escalation/cPanel Account Takeover

## 🛡️ Description

**TNC Toolbox: Web Performance** plugin for WordPress suffers from an _Unauthenticated Sensitive Information Exposure_ vulnerability in all versions up to, and including, **1.4.2**. The plugin stores cPanel API credentials (hostname, username, and API key) insecurely in web-accessible files within the `wp-content` directory. These files are created by the vulnerable `Tnc_Wp_Toolbox_Settings::save_settings` function with no access controls, allowing unauthenticated attackers to retrieve credentials and escalate privileges—from cPanel account takeover to full hosting environment compromise via arbitrary file upload and remote code execution.

- **CVE:** CVE-2025-12539  
- **CVSS Score:** 10.0 (Critical)


## 🧩 Script Features

- Professional and precise version detection of TNC Toolbox plugin.
- Automated exploitation when a vulnerable version is detected (1.4.2 or lower).
- Secure HTTP session handling with advanced header simulation and SSL bypass options.
- Step-by-step output with realistic delays for human-like interaction.
- Robust exception handling for reliability.
- Clean, well-structured JSON report output.


## ⚡ Usage

```bash
python3 CVE-2025-12539.py -u https://target-site.com
```
_Options:_
- `--insecure` : Disable SSL verification (if the target uses self-signed certificates).
- `--timeout <seconds>` : Customize HTTP request timeout (default: 12 seconds).


## 🛠️ Requirements

- Python 3.7+
- `requests` package


## 📦 Output

- Human-readable, delayed step messages covering detection and exploitation status.
- Structured JSON report including:
  - Target URL  
  - Vulnerability status  
  - Detected plugin version  
  - Extracted cPanel credentials (username, API key, hostname)
  - Any errors encountered

Example output:
```json
{
  "tool": "CVE-2025-12539-exploit",
  "description": "CVE-2025-12539 Exploit Script by: Khaled Alenazi",
  "target": "https://target-site.com",
  "checked_at": "2025-11-11T11:57:12Z",
  "vulnerable": true,
  "found_version": "1.4.2",
  "threshold_version": "1.4.2",
  "configs": {
    "cpanel-username": "admin",
    "cpanel-api-key": "**********",
    "server-hostname": "host.target.com"
  },
  "errors": ""
}
```


## ⚖️ Disclaimer

This tool is for educational and authorized security testing purposes only. Usage against systems without explicit permission is strictly prohibited and may be illegal. The author accepts no liability for misuse or any resulting damages.


## 👤 Author & Contacts

- **GitHub**: [Nxploited](https://github.com/Nxploited)
- **Telegram**: [KNxploited](https://t.me/KNxploited)

---

**_By: Nxploited (Khaled Alenazi)_**
File Snapshot

[4.0K] /data/pocs/66cdfdbc446efc635ec477469d710121ee1e1008 ├── [7.5K] CVE-2025-12539.py ├── [1.5K] LICENSE ├── [2.9K] README.md └── [ 17] requirements.txt 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.