关联漏洞
Description
exploit SQL injection ELEX WooCommerce Google Shopping
介绍
# CVE-2025-10046 - ELEX WooCommerce Google Shopping
**Author: Byte Reaper**
## Description
CVE-2025-10046 is a SQL injection vulnerability in the ELEX WooCommerce Google Shopping (Product Feed) plugin for WordPress, versions 1.4.3 and earlier.
The issue resides in the includes/elex-manage-feed-ajax.php file, where the file_to_delete parameter is not properly sanitized before being used in SQL queries.
Attack vector: Authenticated (Administrator)
Impact: An attacker with administrator privileges could inject arbitrary SQL statements, potentially leading to database information disclosure or tampering.
Severity: High (Requires administrator privileges, but may compromise database integrity).
## Requirements :
```
Linux x86_64
GCC
```
## Code Logic (elex-manage-feed-ajax.php)

This image shows the code area in the `elex-manage-feed-ajax.php` file that is vulnerable to SQL injection. The `sanitize_text_field()` function is applied first to sanitize user input from suspicious HTML tags and ensure proper Unicode formatting, but this is not sufficient to prevent SQL injection. Next, a global `$wpdb` object is used to access the `gpf_feeds` table, and the code calls `$wpdb->query` directly without using properly prepared statements or other validation methods. The SQL statement `DELETE FROM $table_name WHERE feed_id= $id` executes user input on the database, and since `file_to_delete` is not strictly validated, this allows SQL injection to be effective.
## Build :
```
gcc exploit.c argparse.c -o CVE-2025-10046 -lcurl
./CVE-2025-10046 -u http://127.0.0.1 -v -c [Cookie file admin]
```
## References :
- NVD : https://nvd.nist.gov/vuln/detail/CVE-2025-10046
## License :
MIT
文件快照
[4.0K] /data/pocs/710adf7aa949a07d8a0436c95a875ad7c76f8079
├── [ 21K] exploit.c
├── [1.0K] LICENSE
├── [179K] logic.png
└── [1.7K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。