关联漏洞
介绍
# CVE-2025-0316-Exploit
# CVE-2025-0316 Exploit Toolkit
🚨 Auth Bypass Exploit for WordPress Plugin WP Directorybox Manager <= 2.5
> 🔥 Automated exploit script for CVE-2025-0316 — Auth Bypass via vulnerable AJAX action.
### ⚠️ Legal Notice
This tool is intended strictly for:
- Research
- Red Team simulation
- Authorized security assessment
Using this tool against targets without consent is illegal.
---
## 🛠 Features
- 🔍 User enumeration via `?author=` trick
- 🚪 Exploit vulnerable plugin action to gain admin panel access
- 🧠 Auto cookie save + login popup
- 🌐 Proxy support + random user-agents
- 💻 Multi-threaded and delay-tunable
---
## ✅ Tested On
- WordPress 6.x
- Plugin: WP Directorybox Manager <= 2.5
---
## 🚀 Usage
```bash
python3 exploit.py -u https://victim-site.com -t 5 -d 1
```
Options:
- -u, --url: Target WordPress site
- -t, --threads: Number of parallel threads (default 3)
- -d, --delay: Delay between requests (default 1.5s)
---
---
## 📁 Output
- Logs saved in `logs/`
- Cookies saved as JSON
- Browser auto-login on success
---
---
##
```
⠀⠀⠀⠀⠀⠀⠀⠀⢀⣴⣶⣖⠠⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠠⣿⣿⣿⣿⣾⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⢠⢤⡄⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣸⣿⣿⣯⢻⡇⠀⠀⠀⠀⠀⠀⠀⢀⣤⣷⠏⠉⠉⢞⠀
⠀⠀⠀⠀⢀⢠⣤⣶⣿⣿⣿⣿⡽⢻⣷⣦⣆⣤⣀⣢⣤⡾⠟⠁⠀⠀⠀⠀⠀
⠀⠀⠀⢀⣭⣿⣿⣿⣿⣿⣿⣿⡿⡟⡘⢿⣿⣍⡉⢍⢁⠁⠀⠀⠀⡠⠀⢆⣠
⠀⠀⢠⣾⣯⣿⣿⣿⣿⢿⡻⣿⣿⣇⣷⣾⠻⣿⣿⣿⣷⣾⣷⣨⣣⣳⢾⣻⣝
⠀⣐⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⠄⠹⢻⠻⡿⣿⣿⣷⣽⡷⣿⣏⡀
⣰⣾⣿⣿⣿⣿⣿⣿⣿⣿⣽⣿⢯⣼⣿⣿⡷⠀⠀⠀⠀⠈⠛⢾⡈⠙⢇⡌⢇
⣻⣿⣿⣿⡏⠈⣿⣿⣿⣿⣿⡿⡿⣿⣟⣿⣧⡧⠄⠀⠀⠀⠀⠀⠀⠀⠀⠈⠂
⢘⢿⣿⣿⣥⠻⣿⣿⣿⣿⡿⣿⣿⣟⣿⣿⣿⣿⣛⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠘⠁⡈⣻⣯⡭⡟⣿⣽⣿⣿⣿⣿⣿⣯⡛⠹⣿⣦⢀⠀⠀⠀⠀⢀⣀⣤⠔
⠀⠀⠀⡏⢩⣿⣿⣿⣿⣿⣿⣤⣦⣤⣈⣋⣭⡴⠾⣿⣿⡿⠞⠛⠛⠋⠉⠀⠀
⠀⠀⣘⠇⢾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣞⣷⡀⠀⠀⠀⠀⠁⠀⠀⠀⠀⠀
⠀⠀⡏⠀⣿⣿⣿⣿⣿⣿⣿⣿⡿⣿⣿⣿⣿⣎⣧⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠰⠀⠹⢻⡻⡽⢿⣳⠯⡹⣿⠷⡩⢿⣿⣿⣿⣿⣎⠓⠀⠀⠀⠀⠀⠀⠀⠀
```
##
this exploit is fully open source so u can use it without any tension or fear and if u find any issues in my code just send a msg to me ill fix it
# REQUIRMENTS
requests
colorama
termcolor
browser-cookie3
---
## 👤 Author
MrPayloadC
- A ORDINARY PERSON
文件快照
[4.0K] /data/pocs/9614fa1e9ae96777f9b9b27cc8aed6029d1c07a6
├── [3.3K] exploit.py
├── [ 785] helpers.py
├── [2.6K] README.md
├── [1.2K] recon.py
├── [ 750] session_handler.py
└── [ 427] user_agents.txt
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。