Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-69411 PoC — WordPress plugin ionCube tester plus 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin ionCube tester plus 安全漏洞 (CVE-2025-69411)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin ionCube tester plus 1.3及之前版本存在安全漏洞,该漏洞源于路径名限制不当,可能导致路径遍历。
Description
The ionCube Tester Plus plugin for WordPress versions <= 1.3 is vulnerable to unauthenticated arbitrary file read via path traversal. The 'ininame' parameter in loader-wizard.php is not properly sanitized, allowing attackers to read  sensitive files such as wp-config.php and /etc/passwd without authentication.
File Snapshot

id: CVE-2025-69411 info: name: ionCube Tester Plus <= 1.3 - Local File Inclusion author: pussyc ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.