漏洞描述 WordPress 的 Time Clock 插件和 Time Clock Pro 插件在 1.2.2 及以下版本(适用于 Time Clock)和 1.1.4 版本(适用于 Time Clock Pro)中存在通过“etimeclockwp_load_function_callback”函数执行远程代码的漏洞。这允许未经身份验证的攻击者在服务器上执行代码。无法指定调用函数的参数。
相关漏洞推荐 WordPress Plugin Alone Theme /wp-admin/admin-ajax.php beplus_import_pack_install_plugin 文件上传漏洞(CVE-2025-5394) Ilevia EVE X1 Server /ajax/php/leaf_replace_device.php 命令执行漏洞 WordPress Ditty /wp-json/dittyeditor/v1/displayItems 服务器端请求伪造漏洞 Ilevia EVE X1 Server /ajax/history/get_history_data_odic.php 命令执行漏洞 WordPress AI Engine /wp-json/mcp/v1 信息泄露漏洞(CVE-2025-11749) WordPress wp-event-solution 插件 /wp-admin/admin-ajax.php 文件读取漏洞(CVE-2025-47445) POC CVE-2019-17671: WordPress <= 5.2.4 - Unauthenticated View Private/Draft Posts POC CVE-2024-39646: WordPress Custom 404 Pro <= 3.11.1 - Reflected XSS POC CVE-2024-6220: WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload POC CVE-2025-47445: WordPress Eventin (Themewinter) ≤ 4.0.26 - Arbitrary File Download POC wp-easy-google-fonts-log-disclosure: WordPress Easy Google Fonts - Error Log Disclosure POC wp-importer-log-disclosure: WordPress Importer - Error Log Disclosure POC wp-buddypress-open-redirect: WordPress BuddyPress < 2.9.2 - Authenticated Open Redirect