CVE-2025-10720 PoC## Description
This proof of concept (PoC) describes an authentication bypass vulnerability found in the **WordPress plugin WP Private Content Plus v3.6.2**. The issue allows unauthenticated users to bypass password-protected content due to improper reliance on client-side cookies.
## Details
- **Vulnerability Type**: Authentication Bypass (Unauthenticated)
- **CWE-ID**: CWE-565 - Reliance on Cookies without Validation and Integrity Checking
## Impact
Successful exploitation allows unauthenticated users to access content protected by the plugin’s global password feature.
## References
- [Video demo](https://youtu.be/e1uMllcXhfE)
- [WPScan](https://wpscan.com/vulnerability/5295e8da-7aba-4322-981b-80d692b3bc35/])
- [Affected plugin](https://wordpress.org/plugins/wp-private-content-plus/)
[4.0K] /data/pocs/501d7aa6b1ade8b9672d1389dba66e801be9ac21
├── [4.0K] images
│ ├── [120K] bypass.png
│ ├── [103K] cookie-creation.png
│ ├── [181K] enable-functions.png
│ ├── [210K] enable-module.png
│ ├── [645K] plugin-cinfiguration.png
│ ├── [160K] plugin-version.png
│ └── [ 92K] protected-page.png
├── [6.1M] poc-demo.mp4
├── [3.0K] PoC.md
└── [ 799] README.md
2 directories, 10 files