This exploit leverages a Local File Disclosure vulnerability in WinduCMS <= 3.1 by abusing a vulnerable PHPMailer version (5.2.1) through a contact form. It sends a crafted payload via a multipart form request to disclose local files (e.g., /etc/passwd).
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:WinduCMS <= 3.1
No auth needed
Prerequisites:Presence of a contact form on the target website