Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-30567 PoC — WordPress WP01 plugin <= 2.6.2 - Arbitrary File Download Vulnerability

Source
Associated Vulnerability
Title:WordPress WP01 plugin <= 2.6.2 - Arbitrary File Download Vulnerability (CVE-2025-30567)
Description:Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP01 WP01 wp01 allows Path Traversal.This issue affects WP01: from n/a through <= 2.6.2.
Description
CVE-2025-30567 - WordPress WP01 < Path traversal
Readme
# CVE-2025-30567 PoC


![Screenshot 2025-04-04 014703](https://github.com/user-attachments/assets/f51ca206-9eb1-4a7b-8ea5-11aca3fdeb86)


CVE-2025-30567 - WordPress WP01 &lt; Path traversal
File Snapshot

[4.0K] /data/pocs/2db79741569953c56f24965c38bdcfaeebb988e7 ├── [ 19K] CVE-2025-30567.py ├── [265K] CVE-2025-30567_W0rdpress-pathtraversal.zip ├── [4.0K] pytransform │   ├── [ 1] @ │   ├── [ 11K] __init__.py │   ├── [ 15K] __init__.pyc │   ├── [ 220] license.lic │   ├── [699K] _pytransform.dll │   └── [ 476] pytransform.key └── [ 190] README.md 1 directory, 9 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →