漏洞描述 MetformWordPress插件易受敏感信息泄露的影响,在2.1.3之前的版本中,对SQL/core/forms/action.php文件的访问控制不当,未经身份验证的攻击者可利用该文件查看所有API密钥和集成的第三方API(如PayPal、Stripe、Mailchimp、Hubspot、HelpScout、reCAPTCHA等信息。
相关漏洞推荐 GLPI /index.php/ajax/ SQL 注入漏洞(CVE-2025-24799) 天锐绿盾审批系统 /trwfe/login.jsp/.%2e/file/addUpFile.do 文件上传漏洞 Flowise /api/v1/node-load-method/customMCP 命令执行漏洞(CVE-2025-8943) N-central /dms/services/ServerMMS XML 外部实体注入漏洞(CVE-2025-11700) dpanel /api/app/compose/get-from-uri 文件读取漏洞(CVE-2025-53363) Fortinet FortiWeb /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi 权限绕过漏洞(CVE-2025-64446/CVE-2025-58034) POC CVE-2017-14725: WordPress < 4.8.2 - Authenticated Open Redirect POC CVE-2017-17092: WordPress < 4.9.1 - Authenticated JavaScript File Upload POC CVE-2018-13317: TOTOLINK A3002RU 1.0.8 - Information Disclosure POC CVE-2019-19822: TOTOLINK/Realtek Routers - Information Disclosure POC CVE-2019-19823: TOTOLINK/Realtek Routers - Information Disclosure POC CVE-2019-19825: TOTOLINK/Realtek Routers - CAPTCHA Bypass POC CVE-2021-34427: Eclipse BIRT Viewer - Remote Code Execution