支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 0a0861b349c1e90998c0b3f12379c58dcdd36649

来源
关联漏洞
标题:WordPress plugin WooCommerce Designer Pro 代码问题漏洞 (CVE-2025-6440)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin WooCommerce Designer Pro 1.9.26及之前版本存在代码问题漏洞,该漏洞源于wcdp_save_canvas_design_ajax函数缺少文件类型验证,可能导致任意文件上传和远程代码执行。
描述
WooCommerce Designer Pro - Arbitrary File Upload
介绍
# CVE-2025-6440
WooCommerce Designer Pro <= 1.9.26 - Unauthenticated Arbitrary File Upload

## Description
WooCommerce Designer Pro plugin for WordPress, used by the Pricom - Printing Company & Design Services WordPress theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'wcdp_save_canvas_design_ajax' function in all versions up to, and including, 1.9.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site server which may make remote code execution possible.

- Vulnerable component: WordPress plugin Canvas Designer (AJAX action `wcdp_save_canvas_design_ajax`)
- CVE: CVE-2025-6440
- CVSS: 9.8 (critical)

## Vulnerability Details
The Canvas Designer plugin accepts file uploads via AJAX without proper checks on file content or extension. An attacker can upload a PHP payload disguised as an image file, gain remote code execution, and take control of the WordPress site.

The attack steps include:
- Sending a crafted POST request to `wp-admin/admin-ajax.php` with the `wcdp_save_canvas_design_ajax` action and malicious payload.
- File is stored under `wp-content/uploads` in a predictable path.
- The attacker then accesses the uploaded PHP file to execute code remotely.

## Requirements
- Python 3.8 or higher
- Requests library

Install dependencies:   
pip install -r requirements.txt

## Usage

- `--url`: The base URL of the WordPress site (e.g., https://example.com)
- `--file`: The PHP payload to upload
- `--verbose`: Optional flag to enable detailed debug output

Example:

```
python3 CVE-2025-6440.py --url https://vulnerablesite.com --file <payload_file> 
```

## Example Output

[ CVE-2025-6440 BY PWDNX1337 ]

[ ] Base: http://target-site.com/  
[ ] uniq: a1b2c3d4e5f6  
[ ] Uploading file: payload.php -> payload.php MIME: application/x-php  

--- Upload Response (HTTP 200) ---   

[ ] Public URL: http://target-site.com/wp-content/uploads/wcdp-uploads/temp/a1b2c3d4e5f6/payload.php  
[ ] Fetching uploaded file from: http://target-site.com/wp-content/uploads/wcdp-uploads/temp/a1b2c3d4e5f6/payload.php  
 
--- Remote File Download (HTTP 200) --- 
 
[+] Remote file is NOT PNG format  
[!] Remote file contains PHP tags - suspicious  
[ ] Extracted PHP code saved to: extracted_a1b2c3d4e5f6.php  
[ ] Saved remote copy as: downloaded_a1b2c3d4e5f6.bin  



## Mitigation
Update the Canvas Designer plugin to the latest version where this vulnerability is patched. Alternatively, restrict direct file uploads and ensure proper validation of uploaded file contents in the plugin.

Site administrators are advised to:
- Remove vulnerable versions immediately.
- Apply security hardening, e.g., disable PHP execution in upload directories.
- Use Web Application Firewalls (WAF) to block malicious AJAX requests.


*Discovered and responsibly disclosed by PWDNX1337, 2025.*
文件快照

[4.0K] /data/pocs/0a0861b349c1e90998c0b3f12379c58dcdd36649 ├── [6.9K] CVE-2025-6440.py ├── [2.8K] README.md └── [ 49] requirements.txt 1 directory, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。