Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-12558 PoC — WordPress plugin WP BASE Booking of Appointments, Services and Events 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin WP BASE Booking of Appointments, Services and Events 安全漏洞 (CVE-2024-12558)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WP BASE Booking of Appointments, Services and Events 4.9.2版本及之前版本存在安全漏洞,该漏洞源于export_db函数缺少功能检查,导致未经授权的数据访问。
Readme
# CVE-2024-12558-exploit

# Description
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password.

## Usage:

### Command-Line Arguments
| Argument           | Description                                                | Required |
|--------------------|------------------------------------------------------------|----------|
| `-u`, `--url`      | Base URL of the WordPress site (e.g., `http://example.com`) | ✅       |
| `-U`, `--username` | WordPress username.                                         | ✅       |
| `-p`, `--password` | WordPress password.                                         | ✅       |
| `-o`, `--output`   | File to save the database export (default: `output.sql`).   | ❌       |


Example Command
```
python CVE-2024-12558.py -u http://example.com -U username -p password -o output.sql

```
### Expected Output:
Here is an example of what the script might output:

```
Checking for the existence of the plugin at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/...
Plugin found! Proceeding with further checks.
Checking version at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/readme.txt...
Found version: 4.9.2
The site is vulnerable! Version 4.9.2 detected.
Attempting to log in...
Logged in successfully.
Sending POST request to export the database...
Database export request successful!
Database saved to output.sql

```
### Install the required packages

```
pip install requests
pip install colorama
```


### Note: 
This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.
File Snapshot

[4.0K] /data/pocs/634005fa049c0b102c4096660dfcb109ca3150f8 ├── [5.8K] CVE-2024-12558.py └── [2.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.