POC详情: 9147b2c237526b514ec366dc25bcd883ee444720

来源
关联漏洞
标题: WordPress plugin Opal Estate Pro 安全漏洞 (CVE-2025-6934)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Opal Estate Pro 1.7.5及之前版本存在安全漏洞,该漏洞源于on_regiser_user函数缺少角色限制,可能导致权限提升。
描述
CVE-2025-6934 - Exploit WordPress Opal Estate Pro 
介绍
# CVE-2025-6934 Auto Exploit

![Python](https://img.shields.io/badge/Python-3.11-blue)
![Status](https://img.shields.io/badge/Status-POC-orange)
![Author](https://img.shields.io/badge/Author-Rosemary1337-red)

---

## ⚡ Overview

**CVE-2025-6934** is a proof-of-concept (PoC) exploit targeting **WordPress Plugin: Opal Estate Pro ≤ 1.7.5**.  
This exploit demonstrates **unauthenticated administrator account creation**.

> **Disclaimer:** This PoC is for educational purposes only. Do **not** use on systems without permission.

---

## 🛠 Features

- Detect plugin version automatically.
- Retrieve required nonce for registration.
- Create a new administrator account without authentication.
- Colorful console output with status, success, failure, and info messages.
- Works on Python 3.x with minimal dependencies.

---

## ⚙️ Installation

1. Clone the repository:
```bash
git clone https://github.com/Rosemary1337/CVE-2025-6934.git
cd CVE-2025-6934
````

2. Install dependencies:

```bash
pip install -r requirements.txt
```

> Requirements: `requests`, `beautifulsoup4`, `colorama`

---

## 🚀 Usage

```bash
python3 main.py -u <TARGET_URL> -mail <EMAIL> -password <PASSWORD> -user <USERNAME>
```

### Example:

```bash
python3 main.py -u http://site.com/ -mail admin@horsefucker.org -password 3xplo1tI5Fun -user r1337
```

### Arguments

| Flag                       | Description            | Required | Default         |
| -------------------------- | ---------------------- | -------- | --------------- |
| `-u, --url`                | Target site URL        | Yes      | -               |
| `-mail, --newmail`         | Email for new admin    | Yes      | -               |
| `-password, --newpassword` | Password for new admin | Yes      | -               |
| `-user, --username`        | Username for new admin | No       | `administrator` |

---

## 🎨 Output

The console shows:

* Status messages `[•]`
* Success `[✔]`
* Fail `[✖]`
* Info `[i]`

Example:

```
[•] Starting Exploit...
[✔] Nonce Found: xyz123
[✔] Exploit Successful!
    Username : r1337
    Email    : admin@horsefucker.org
    Password : 3xplo1tI5Fun
    Role     : administrator
```
---

## 🔐 Security & Disclaimer

* For **educational & testing purposes only**.
* Do **not** attack websites without explicit permission.
* Use in a controlled lab or authorized penetration test only

---

## 🔗 Connect with Me

I'm an active developer who enjoys building tools and sharing knowledge. You can reach me through:
<p align="left"> <a href="https://github.com/Rosemary1337" target="_blank"> <img src="https://img.shields.io/badge/GitHub-181717?style=for-the-badge&logo=github&logoColor=white"/> </a> <a href="https://t.me/stupidp3rson" target="_blank"> <img src="https://img.shields.io/badge/Telegram-26A5E4?style=for-the-badge&logo=telegram&logoColor=white"/> </a> <a href="https://www.tiktok.com/@justan0therloser" target="_blank"> <img src="https://img.shields.io/badge/TikTok-000000?style=for-the-badge&logo=tiktok&logoColor=white"/> </a> <a href="mailto:rayhanmahardika576@gmail.com" target="_blank"> <img src="https://img.shields.io/badge/Email-8A2BE2?style=for-the-badge&logo=minutemailer&logoColor=white"/> </a> </p> 
文件快照

[4.0K] /data/pocs/9147b2c237526b514ec366dc25bcd883ee444720 ├── [1.0K] LICENSE ├── [8.7K] main.bin ├── [ 255] main.py ├── [3.2K] README.md └── [ 33] requirements.txt 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。