Wordpress Plugin AI Engine Authenticated Subscriber Arbitrary File Upload Vulnerability
漏洞信息
漏洞名称: Wordpress Plugin AI Engine Authenticated Subscriber Arbitrary File Upload Vulnerability
漏洞编号:
- CVE: CVE-2025-7847
漏洞类型: 文件上传
漏洞等级: 高危
漏洞描述: 该漏洞存在于WordPress的AI Engine插件2.9.3至2.9.4版本中,允许认证用户(如订阅者)通过插件提供的API上传任意文件,包括恶意脚本如PHP webshell。此漏洞的利用需要满足特定条件:插件的“Public API”选项必须被启用(默认情况下是禁用的),并且没有配置Bearer Token或自定义认证机制来保护API。漏洞的技术根源在于插件对上传文件的类型和内容缺乏严格的验证和过滤,导致攻击者可以绕过安全限制上传恶意文件。成功利用此漏洞的攻击者可以在目标服务器上执行任意代码,可能导致服务器被完全控制、数据泄露或其他恶意活动。由于需要认证才能利用,此漏洞的利用门槛相对较高,但一旦被利用,其影响极为严重。
产品厂商: Wordpress
产品名称: AI Engine
影响版本: 2.9.3 <= version <= 2.9.4
来源: https://github.com/EricArdiansa/CVE-2025-7847-POC
类型: CVE-2025:github search
仓库文件
- CVE-2025-7847-POC.mp4
- LICENSE
- README.md
- exploit-auto.py
- exploit-manual.py
- exploit.py
- reverse.php
- shell.php
- thumbnail.png
来源概述
CVE-2025-7847 Wordpress Plugin Authenticated Subscriber Arbitrary File Upload POC
Wordpress Plugin AI Engine 2.9.3 - 2.9.4 Proof Of Concept
Please note that this vulnerability can only be exploited if the “Public API” option is enabled, which is disabled by default, and no Bearer Token is configured, nor is custom authentication added and used to protect the API.
Automate Version
1 |
|
Web Shell Upload Only
1 |
|