Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32118 PoC — WordPress plugin CMP – Coming Soon & Maintenance 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin CMP – Coming Soon & Maintenance 代码问题漏洞 (CVE-2025-32118)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin CMP – Coming Soon & Maintenance 4.1.13及之前版本存在代码问题漏洞,该漏洞源于允许上传危险类型文件。
Description
WordPress CMP – Coming Soon & Maintenance plugin <= 4.1.13 - Remote Code Execution (RCE) vulnerability
Readme

# 🚀 CVE-2025-32118 - WordPress CMP Plugin RCE Exploit

🔍 **Title:** WordPress CMP – Coming Soon & Maintenance plugin <= 4.1.13 - Remote Code Execution (RCE)  
🗓️ **Published:** 2025-04-04   
🔐 **CWE:** CWE-434 - Unrestricted Upload of File with Dangerous Type  
📊 **CVSS:** 9.1 (CRITICAL) — CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

---

## 📜 Description

A critical **Remote Code Execution** (RCE) vulnerability exists in the **CMP – Coming Soon & Maintenance** plugin for WordPress (<= 4.1.13).  
This flaw allows an **authenticated admin user** to upload malicious ZIP files containing executable PHP shells, leading to **full site compromise**.

---

## 💥 Impact

- Upload of arbitrary PHP code inside the plugin directory
- Unrestricted execution of system commands via web shell
- Potential full server takeover

---

## ⚙️ Requirements

- WordPress site with vulnerable CMP plugin installed (`<= 4.1.13`)
- Valid WordPress admin credentials (Authentication Required)

---

## 💻 Usage

```bash
python3 CVE-2025-32118.py -u http://target-site.com/wordpress -un admin -p password
```

## ✍️ Usage (CLI Help Output)

```
usage: CVE-2025-32118.py [-h] -u URL -un USERNAME -p PASSWORD
Exploit For CVE-2025-32118 : By Nxploited - Khaled Alenazi

options:
  -h, --help            show this help message and exit
  -u, --url URL         Base URL of WordPress site
  -un, --username USERNAME   Admin username
  -p, --password PASSWORD    Admin password
```

---



### 📌 Arguments:

| Flag       | Description                    |
|------------|--------------------------------|
| `-u`       | Base URL of WordPress site     |
| `-un`      |       username                 |
| `-p`       |       password                 |

---

## 🧪 What it does:

1. Authenticates to the WordPress admin panel.
2. Fetches a valid `nonce` for upload request.
3. Creates a malicious ZIP with:
   - `style.css` (valid theme format)
   - `nxploitedshell.php` (RCE payload)
4. Uploads the ZIP using the vulnerable theme upload functionality.
5. Verifies the shell by executing `?cmd=whoami`.

---

## 📂 Shell Location

Once uploaded successfully, the shell will be located at:

```
/wp-content/plugins/cmp-premium-themes/nxploitedshell/nxploitedshell.php
```

Test it via:

```bash
http://target-site.com/wp-content/plugins/cmp-premium-themes/nxploitedshell/nxploitedshell.php?cmd=id
```

---

## ❗ Disclaimer

> This exploit is for **educational purposes** only.  
> Unauthorized use of this code **against systems you don't own** is illegal and unethical.

---

## 🔗 Reference

- [CVE-2025-32118 on MITRE](https://cve.mitre.org/)
- CWE-434: [https://cwe.mitre.org/data/definitions/434.html](https://cwe.mitre.org/data/definitions/434.html)

---

## ✒️ By:
*Nxploited | Khaled Alenazi*
File Snapshot

[4.0K] /data/pocs/7c55f1a5ed464ed61023b04f7b6dddc4bbce5615 ├── [4.1K] CVE-2025-32118.py ├── [1.1K] LICENSE ├── [2.8K] README.md └── [ 24] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.