支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 710adf7aa949a07d8a0436c95a875ad7c76f8079

来源
关联漏洞
标题:WordPress plugin ELEX WooCommerce Google Shopping SQL注入漏洞 (CVE-2025-10046)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin ELEX WooCommerce Google Shopping 1.4.3及之前版本存在SQL注入漏洞,该漏洞源于对参数file_to_delete的转义不足和SQL查询准备不充分,可能导致SQL注入攻击。
Description
exploit SQL injection ELEX WooCommerce Google Shopping 
介绍
# CVE-2025-10046 - ELEX WooCommerce Google Shopping
**Author: Byte Reaper**

## Description
CVE-2025-10046 is a SQL injection vulnerability in the ELEX WooCommerce Google Shopping (Product Feed) plugin for WordPress, versions 1.4.3 and earlier.
The issue resides in the includes/elex-manage-feed-ajax.php file, where the file_to_delete parameter is not properly sanitized before being used in SQL queries.

Attack vector: Authenticated (Administrator)

Impact: An attacker with administrator privileges could inject arbitrary SQL statements, potentially leading to database information disclosure or tampering.

Severity: High (Requires administrator privileges, but may compromise database integrity).

## Requirements :
```
Linux x86_64
GCC 
```
## Code Logic (elex-manage-feed-ajax.php)
![Logic Code](./logic.png)

This image shows the code area in the `elex-manage-feed-ajax.php` file that is vulnerable to SQL injection. The `sanitize_text_field()` function is applied first to sanitize user input from suspicious HTML tags and ensure proper Unicode formatting, but this is not sufficient to prevent SQL injection. Next, a global `$wpdb` object is used to access the `gpf_feeds` table, and the code calls `$wpdb->query` directly without using properly prepared statements or other validation methods. The SQL statement `DELETE FROM $table_name WHERE feed_id= $id` executes user input on the database, and since `file_to_delete` is not strictly validated, this allows SQL injection to be effective.


## Build :
```
gcc exploit.c argparse.c -o CVE-2025-10046 -lcurl
./CVE-2025-10046 -u http://127.0.0.1 -v -c [Cookie file admin]
```

## References : 
- NVD : https://nvd.nist.gov/vuln/detail/CVE-2025-10046


## License : 

MIT




文件快照

[4.0K] /data/pocs/710adf7aa949a07d8a0436c95a875ad7c76f8079 ├── [ 21K] exploit.c ├── [1.0K] LICENSE ├── [179K] logic.png └── [1.7K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。