关联漏洞
标题:
WordPress plugin WPBookit 代码问题漏洞
(CVE-2025-6058)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WPBookit 1.0.4及之前版本存在代码问题漏洞,该漏洞源于image_upload_handle函数缺少文件类型验证,可能导致未经验证的攻击者上传任意文件。
描述
WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload
介绍
# ⚡ WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload
---
## 📝 Description
The **WPBookit** plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `image_upload_handle()` function, which is hooked via the `add_booking_type` route in all versions up to, and including, **1.0.4**.
This flaw allows unauthenticated attackers to upload arbitrary files to the affected site's server, potentially leading to **remote code execution**.
| CVE | CVSS Score | Publicly Published | Last Updated |
|------------------|---------------------|--------------------|--------------------|
| **CVE-2025-6058**| **9.8 (Critical)** | July 11, 2025 | July 12, 2025 |
---
## 🚀 What does this exploit do?
This exploit automates the process of:
- Detecting if the target is running a vulnerable version of WPBookit (<= 1.0.4)
- Uploading a PHP shell using the vulnerable route, without authentication
- Confirming the shell upload and providing its exact path for remote command execution
---
## 🛠️ Usage
```bash
python3 CVE-2025-6058.py -u http://target.com/wordpress
```
---
## 🖥️ Example
```bash
python3 CVE-2025-6058.py -u http://target.com/wordpress
```
---
## 🆘 Help & Banner Example
```bash
python CVE-2025-6058.py -help
______ __ __ ________ ______ ______ ______ _______ ______ ______ _______ ______
/ \ / | / |/ | / \ / \ / \ / | / \ / \ / | / \
/$$$$$$ |$$ | $$ |$$$$$$$$/ /$$$$$$ |/$$$$$$ |/$$$$$$ |$$$$$$$/ /$$$$$$ |/$$$$$$ |$$$$$$$/ /$$$$$$ |
$$ | $$/ $$ | $$ |$$ |__ ______$$____$$ |$$$ \$$ |$$____$$ |$$ |____ ______ $$ \__$$/ $$$ \$$ |$$ |____ $$ \__$$ |
$$ | $$ \ /$$/ $$ |/ |/ $$/ $$$$ $$ | / $$/ $$ \ / |$$ \ $$$$ $$ |$$ \ $$ $$<
$$ | __ $$ /$$/ $$$$$/ $$$$$$//$$$$$$/ $$ $$ $$ |/$$$$$$/ $$$$$$$ |$$$$$$/ $$$$$$$ |$$ $$ $$ |$$$$$$$ | $$$$$$ |
$$ \__/ | $$ $$/ $$ |_____ $$ |_____ $$ \$$$$ |$$ |_____ / \__$$ | $$ \__$$ |$$ \$$$$ |/ \__$$ |$$ \__$$ |
$$ $$/ $$$/ $$ | $$ |$$ $$$/ $$ |$$ $$/ $$ $$/ $$ $$$/ $$ $$/ $$ $$/
$$$$$$/ $/ $$$$$$$$/ $$$$$$$$/ $$$$$$/ $$$$$$$$/ $$$$$$/ $$$$$$/ $$$$$$/ $$$$$$/ $$$$$$/
Exploit By : Khaled Alenazi (Nxploited ) GitHub: https://github.com/Nxploited
usage: CVE-2025-6058.py [-h] -u URL
CVE-2025-6058 WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload | by Khaled Alenazi (Nxploited)
options:
-h, --help show this help message and exit
-u, --url URL Target URL e.g http(s)://target.com/wordpress
```
---
## 📤 Output
```
[*] Checking plugin version ...
[*] Exploiting file upload ...
[+] Exploitation successful!
[+] Shell path: wp-content/uploads/2025/07/shell.php?cmd=whoami
Exploit By : Khaled Alenazi (Nxploited ) GitHub: https://github.com/Nxploited
```
---
## ⚠️ Disclaimer
This tool is provided for **educational and authorized security testing purposes only**.
The author is not responsible for any misuse or unauthorized activity.
**Use at your own risk and always ensure you have permission to test the target system.**
---
**_By: Khaled Alenazi (Nxploited)_**
文件快照
[4.0K] /data/pocs/96a0d3d6e81b56c9939b80fcbf913f44962a2f60
├── [5.0K] CVE-2025-6058.py
├── [1.1K] LICENSE
├── [3.7K] README.md
└── [ 9] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。