Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-7422 PoC — WordPress Site Editor插件信息泄露漏洞

Source
Associated Vulnerability
Title:WordPress Site Editor插件信息泄露漏洞 (CVE-2018-7422)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。Site Editor plugin是使用在其中的一个所见即所得的前端编辑器。 WordPress Site Editor插件1.1.1及之前版本中存在本地文件包含漏洞。远程攻击者可通过向editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php文件发送‘ajax_path’参数利用该漏洞检索任
Description
Exploit for CVE-2018-7422: Local File Inclusion in WordPress Plugin Site Editor 1.1.1 [T1574.008]
Readme
# CVE-2018-7422
Exploit for [CVE-2018-7422](https://wpscan.com/vulnerability/4432ecea-2b01-4d5c-9557-352042a57e44/): Local File Inclusion in WordPress Plugin Site Editor 1.1.1 [[T1574.008]](https://attack.mitre.org/techniques/T1574/008/)

### Syntax
```
ruby <target IP or domain> <target file to exfil>
```
# Lab Environment 
[OffSec Proving Grounds - Readys](https://portal.offsec.com/machine/readys-32746/overview)

### Usage
<img width="1254" height="1135" alt="image" src="https://github.com/user-attachments/assets/8d0b2c33-2e07-445c-9545-92c7883184bb" />

File Snapshot

[4.0K] /data/pocs/7f5f132e20dc2c81e6e724a7333796b1c95676aa ├── [2.0K] CVE-2018-7422.rb ├── [1.0K] LICENSE └── [ 563] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.