漏洞描述 WordPress的wp-event-solution插件存在文件读取漏洞(CVE-2025-47445),攻击者可通过向/wp-admin/admin-ajax.php发送POST请求,构造action=proxy_image和url参数传入路径遍历字符或敏感文件路径(如/etc/passwd),读取服务器上的敏感文件,无需授权即可获取敏感信息。
相关漏洞推荐 WordPress AI Engine /wp-json/mcp/v1 信息泄露漏洞(CVE-2025-11749) POC CVE-2019-17671: WordPress <= 5.2.4 - Unauthenticated View Private/Draft Posts POC CVE-2024-39646: WordPress Custom 404 Pro <= 3.11.1 - Reflected XSS POC CVE-2024-6220: WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload POC CVE-2025-47445: WordPress Eventin (Themewinter) ≤ 4.0.26 - Arbitrary File Download POC wp-easy-google-fonts-log-disclosure: WordPress Easy Google Fonts - Error Log Disclosure POC wp-importer-log-disclosure: WordPress Importer - Error Log Disclosure POC wp-buddypress-open-redirect: WordPress BuddyPress < 2.9.2 - Authenticated Open Redirect POC wp-woocommerce-admin-fpd: WordPress Plugin WooCommerce Admin (woocommerce-admin) Full Path Disclosure Ilevia EVE X1 Server /ajax/php/get_file_content.php 文件读取漏洞(CVE-2025-34518) Ilevia EVE X1 Server /ajax/php/leaf_search.php 命令执行漏洞(CVE-2025-14276) POC CVE-2019-25213: WordPress Advanced Access Manager - Path Traversal POC CVE-2021-36888: WordPress Image Hover Ultimate - Unauthenticated Settings Update