Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-54352 PoC — WordPress 安全漏洞

Source
Associated Vulnerability
Title:WordPress 安全漏洞 (CVE-2025-54352)
Description:WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress 3.5至6.8.2版本存在安全漏洞,该漏洞源于对pingback.ping XML-RPC请求处理不当,可能导致私有和草稿文章标题被猜测。
Description
CVE-2025-54352 PoC
Readme
# CVE-2025-54352 PoC

# Usage

Steps to install and test the WordPress PoC:

## 1. Install a fresh version of WordPress using Docker:

   1.1 Start the MySQL database container:
   ```
   docker run --name wp-db -e MYSQL_DATABASE=wp-db -e MYSQL_USER=wpuser -e MYSQL_PASSWORD=password -e MYSQL_ROOT_PASSWORD=rootpass -d mysql:5.7
   ```
   1.2 Start the WordPress container linked to the DB
   ```
   docker run --name wp-site --link wp-db:mysql \
     -e WORDPRESS_DB_HOST=wp-db \
     -e WORDPRESS_DB_NAME=wp-db \
     -e WORDPRESS_DB_USER=wpuser \
     -e WORDPRESS_DB_PASSWORD=password \
     -p 8080:80 -d wordpress
  ```
## 2. In the WordPress admin dashboard (http://localhost:8080):
   - Log in
   - Create a new draft or private post with the title "secret title"


## 3. Install the required Node.js dependency:
   npm install node-fetch

## 4. Save the PoC:
As test.js for example.

## 5. Run the PoC:
   node test.js http://localhost:8080/ secret

   After around 10 seconds, you should see:
   "Done! the title is: secret title"

https://www.imperva.com/blog/beware-a-threat-actor-could-steal-the-titles-of-your-private-and-draft-wordpress-posts/
File Snapshot

[4.0K] /data/pocs/9efb5c45c6a4e667bf730202d6cdef7ed727e212 ├── [1.1K] README.md └── [4.0K] test.js 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.