Exploit for CVE-2018-7422: Local File Inclusion in WordPress Plugin Site Editor 1.1.1 [T1574.008]# CVE-2018-7422
Exploit for [CVE-2018-7422](https://wpscan.com/vulnerability/4432ecea-2b01-4d5c-9557-352042a57e44/): Local File Inclusion in WordPress Plugin Site Editor 1.1.1 [[T1574.008]](https://attack.mitre.org/techniques/T1574/008/)
### Syntax
```
ruby <target IP or domain> <target file to exfil>
```
# Lab Environment
[OffSec Proving Grounds - Readys](https://portal.offsec.com/machine/readys-32746/overview)
### Usage
<img width="1254" height="1135" alt="image" src="https://github.com/user-attachments/assets/8d0b2c33-2e07-445c-9545-92c7883184bb" />
[4.0K] /data/pocs/7f5f132e20dc2c81e6e724a7333796b1c95676aa
├── [2.0K] CVE-2018-7422.rb
├── [1.0K] LICENSE
└── [ 563] README.md
0 directories, 3 files