Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-69411 PoC — WordPress ionCube tester plus plugin <= 1.3 - Arbitrary File Download vulnerability

Source
Associated Vulnerability
Title:WordPress ionCube tester plus plugin <= 1.3 - Arbitrary File Download vulnerability (CVE-2025-69411)
Description:Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Robert Seyfriedsberger ionCube tester plus ioncube-tester-plus allows Path Traversal.This issue affects ionCube tester plus: from n/a through <= 1.3.
Description
The ionCube Tester Plus plugin for WordPress versions <= 1.3 is vulnerable to unauthenticated arbitrary file read via path traversal. The 'ininame' parameter in loader-wizard.php is not properly sanitized, allowing attackers to read  sensitive files such as wp-config.php and /etc/passwd without authentication.
File Snapshot

id: CVE-2025-69411 info: name: ionCube Tester Plus <= 1.3 - Local File Inclusion author: pussyc ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →