漏洞描述 文件读取漏洞是指攻击者通过某种方式获取对系统文件的读取权限,从而访问敏感信息,如配置文件、源代码、用户数据等。这种漏洞通常是由于应用程序未正确实施权限控制或者未对用户输入进行充分过滤和验证导致的。
相关漏洞推荐 WordPress Plugin Alone Theme /wp-admin/admin-ajax.php beplus_import_pack_install_plugin 文件上传漏洞(CVE-2025-5394) WordPress Time Clock 插件 /wp-admin/admin-ajax.php 代码执行漏洞 (CVE-2024-9593) WordPress Ditty /wp-json/dittyeditor/v1/displayItems 服务器端请求伪造漏洞 WordPress AI Engine /wp-json/mcp/v1 信息泄露漏洞(CVE-2025-11749) WordPress wp-event-solution 插件 /wp-admin/admin-ajax.php 文件读取漏洞(CVE-2025-47445) POC CVE-2019-17671: WordPress <= 5.2.4 - Unauthenticated View Private/Draft Posts POC CVE-2024-39646: WordPress Custom 404 Pro <= 3.11.1 - Reflected XSS POC CVE-2024-6220: WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload POC CVE-2025-47445: WordPress Eventin (Themewinter) ≤ 4.0.26 - Arbitrary File Download POC wp-easy-google-fonts-log-disclosure: WordPress Easy Google Fonts - Error Log Disclosure POC wp-importer-log-disclosure: WordPress Importer - Error Log Disclosure POC wp-buddypress-open-redirect: WordPress BuddyPress < 2.9.2 - Authenticated Open Redirect POC wp-woocommerce-admin-fpd: WordPress Plugin WooCommerce Admin (woocommerce-admin) Full Path Disclosure