Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| iqonicdesign | WPBookit | * ~ 1.0.4 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload | https://github.com/Nxploited/CVE-2025-6058 | POC Details |
| 2 | None | https://github.com/JayVillain/Scan-CVE-2025-6058 | POC Details |
| 3 | The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-6058.yaml | POC Details |
| 4 | WordPress WPBookit ≤ 1.0.4 Unauthenticated File Upload Exploit | https://github.com/0xgh057r3c0n/CVE-2025-6058 | POC Details |
| 5 | WordPress WPBookit ≤ 1.0.4 Unauthenticated File Upload Exploit | https://github.com/zr1p3r/CVE-2025-6058 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet