Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25003 PoC — WordPress plugin WPCargo Track & Trace 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin WPCargo Track & Trace 代码问题漏洞 (CVE-2021-25003)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WPCargo Track & Trace 6.9.0 之前版本存在代码问题漏洞,该漏洞源于该插件包含一个文件,该文件允许未经身份验证的攻击者在 Web 服务器的任何位置写入 PHP 文件,从而导致远程执行代码或命令。
Description
WPCargo < 6.9.0 - Unauthenticated RCE
Readme
# CVE-2021-25003
[![made-with-python](https://img.shields.io/badge/Made%20with-Python-1f425f.svg)](https://www.python.org/)

```
Title: WPCargo < 6.9.0 - Unauthenticated RCE
Author: Krzysztof Zając [ https://kazet.cc/ ]
CVE: CVE-2021-25003
```

### Installation
```
git clone https://github.com/biulove0x/CVE-2021-25003.git
cd CVE-2021-25003/
python3 -m pip install -r requirements.txt
```

### How to run autoexploit
```
$ python3 WpCargo.py --help
############################################
# @author : biulove0x                      #
# @name   : WP Plugins WPCargo Exploiter   #
# @cve    : CVE-2021-25003                 #
############################################

usage: exploit.py [-h] [-t example.com] [-l target.txt]

CVE-2021-25003 [ WPCargo < 6.9.0 - Unauthenticated RCE ]

optional arguments:
  -h, --help      show this help message and exit
  -t example.com  Single target
  -l target.txt   Multiple target
```

#### Single target
```
$ python3 WPCargo.py -t http://example.com/
```

#### Multiple target
```
$ cat domains.txt
http://example.com/
https://examples.com/

$ python3 WPCargo.py -l target.txt
```

### References :

* https://wpscan.com/vulnerability/5c21ad35-b2fb-4a51-858f-8ffff685de4a

### Donate :
BTC : bc1qst09sxcnq97a4wgsqvpkg4fxyjczvs3xe7278h

BNB : bnb1jhp2hv9utr8u97387p35fmftgr8wpjp39altz0

[!["Buy Me A Coffee"](https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png)](https://www.buymeacoffee.com/biulove0x)
File Snapshot

[4.0K] /data/pocs/3fd516690ae6d4f6eebfbc72617c80fc3653ce93 ├── [1.4K] README.md ├── [ 37] requirements.txt └── [3.5K] WpCargo.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.