关联漏洞
描述
CVE‑2025‑3515 — Drag and Drop Multiple File Upload for Contact Form 7
介绍
# CVE-2025-3515
CVE‑2025‑3515 — Drag and Drop Multiple File Upload for Contact Form 7
- **Description:** Arbitrary file uploads via `drag‑and‑drop‑multiple‑file‑upload-contact‑form‑7` ≤1.3.8.9 allow upload of `.phar` files, leading to remote code execution in Apache+mod_php :contentReference[oaicite:29]{index=29}.
- **CVSS (v3.1):** 8.1 (High) :contentReference[oaicite:30]{index=30}
- **Patch:** Updated to ≥1.3.9.0 :contentReference[oaicite:31]{index=31}
- **References:**
- NVD: CVE‑2025‑3515 :contentReference[oaicite:32]{index=32}
- Wiz, feedly, GitHub advisory, Wordfence, WordPress Trac links above
The tool coded in python version 3 use checker for detect the existing plugin then use the exploit
Telegram: https://t.me/Professor6T9
Team Telegram: https://t.me/TeamAnonForce6T9
文件快照
[4.0K] /data/pocs/8dd6e60ee1a7832e2bd5850156a1073ed7a88467
├── [2.3K] checker.py
├── [2.3K] exploit.py
└── [ 831] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。