## https://sploitus.com/exploit?id=38DD669A-D9E3-549C-8630-9BE136ED2966
# CVE-2025-2539 - WordPress File Away <= 3.9.9.0.1 - Arbitrary File Read
๐ฅ **Vulnerability Summary**
The WordPress plugin **File Away** version <= 3.9.9.0.1 is vulnerable to an unauthenticated arbitrary file read vulnerability.
This allows attackers to read any file on the server, such as `wp-config.php`, through a crafted request to the plugin's AJAX endpoint.
The vulnerability stems from improper nonce validation and lack of path restriction when using the `fileaway-stats` action via `admin-ajax.php`.
Attackers can leverage this to retrieve sensitive files and extract credentials, potentially leading to full compromise.
---
๐ **Affected Plugin**
- **Plugin Name:** File Away
- **Affected Version:** <= 3.9.9.0.1
- **Vulnerability Type:** Unauthenticated Arbitrary File Read
- **CVE ID:** CVE-2025-2539
- **CVSS Score:** 9.1 (Critical)
- **Impact:** Sensitive Information Disclosure โ Potential RCE (via DB creds + upload)
---
๐งช **Exploit Features**
- ๐ฅ Fetches `nonce` automatically from the target page
- ๐ Reads arbitrary file (e.g., `wp-config.php`)
- ๐ Extracts DB credentials (`DB_USER`, `DB_PASSWORD`, `DB_HOST`)
- โ Validates access to `/phpmyadmin` or `/phpMyAdmin`
- ๐ Attempts remote DB login using retrieved credentials
- ๐พ Stores valid credentials and phpMyAdmin access in:
- `result_database.txt`
- `result_phpmyadmin_dan_config_valid.txt`
- `result_databaseremotevalid.txt`
---
๐ง **Researcher**
Credit: [https://github.com/RootHarpy/CVE-2025-2539](https://github.com/RootHarpy/CVE-2025-2539)
---
๐ **Usage**
Prepare your `list.txt` file with a list of target domains (one per line, **without** `http` or `https`).
Example `list.txt`:
```
example.com
victimsite.org
target123.net
```
Run the script:
```bash
python3 mass_cve_2539.py
```
---
๐ **Output**
- `result_database.txt` โ List of extracted DB credentials
- `result_phpmyadmin_and_config_valid.txt` โ List of phpMyAdmin URLs found
- `result_databaseremotevalid.txt` โ List of valid remote DB credentials
---
๐ **Disclaimer:**
This tool is intended **for educational purposes only** and **should only be used on systems you own or are explicitly authorized to test**. Misuse of this code may lead to legal consequences.