POC详情: 96a0d3d6e81b56c9939b80fcbf913f44962a2f60

来源
关联漏洞
标题: WordPress plugin WPBookit 代码问题漏洞 (CVE-2025-6058)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WPBookit 1.0.4及之前版本存在代码问题漏洞,该漏洞源于image_upload_handle函数缺少文件类型验证,可能导致未经验证的攻击者上传任意文件。
描述
WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload
介绍
# ⚡ WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload

---

## 📝 Description

The **WPBookit** plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `image_upload_handle()` function, which is hooked via the `add_booking_type` route in all versions up to, and including, **1.0.4**.  
This flaw allows unauthenticated attackers to upload arbitrary files to the affected site's server, potentially leading to **remote code execution**.

| CVE              | CVSS Score          | Publicly Published | Last Updated       |
|------------------|---------------------|--------------------|--------------------|
| **CVE-2025-6058**| **9.8 (Critical)**  | July 11, 2025      | July 12, 2025      |

---

## 🚀 What does this exploit do?

This exploit automates the process of:
- Detecting if the target is running a vulnerable version of WPBookit (<= 1.0.4)
- Uploading a PHP shell using the vulnerable route, without authentication
- Confirming the shell upload and providing its exact path for remote command execution

---

## 🛠️ Usage

```bash
python3 CVE-2025-6058.py -u http://target.com/wordpress
```

---

## 🖥️ Example

```bash
python3 CVE-2025-6058.py -u http://target.com/wordpress
```

---

## 🆘 Help & Banner Example

```bash
python CVE-2025-6058.py -help

  ______   __     __  ________       ______    ______    ______   _______            ______    ______   _______    ______  
 /      \ /  |   /  |/        |     /      \  /      \  /      \ /       |          /      \  /      \ /       |  /      \ 
/$$$$$$  |$$ |   $$ |$$$$$$$$/     /$$$$$$  |/$$$$$$  |/$$$$$$  |$$$$$$$/          /$$$$$$  |/$$$$$$  |$$$$$$$/  /$$$$$$  |
$$ |  $$/ $$ |   $$ |$$ |__  ______$$____$$ |$$$  \$$ |$$____$$ |$$ |____   ______ $$ \__$$/ $$$  \$$ |$$ |____  $$ \__$$ |
$$ |      $$  \ /$$/ $$    |/      |/    $$/ $$$$  $$ | /    $$/ $$      \ /      |$$      \ $$$$  $$ |$$      \ $$    $$< 
$$ |   __  $$  /$$/  $$$$$/ $$$$$$//$$$$$$/  $$ $$ $$ |/$$$$$$/  $$$$$$$  |$$$$$$/ $$$$$$$  |$$ $$ $$ |$$$$$$$  | $$$$$$  |
$$ \__/  |  $$ $$/   $$ |_____     $$ |_____ $$ \$$$$ |$$ |_____ /  \__$$ |        $$ \__$$ |$$ \$$$$ |/  \__$$ |$$ \__$$ |
$$    $$/    $$$/    $$       |    $$       |$$   $$$/ $$       |$$    $$/         $$    $$/ $$   $$$/ $$    $$/ $$    $$/ 
 $$$$$$/      $/     $$$$$$$$/     $$$$$$$$/  $$$$$$/  $$$$$$$$/  $$$$$$/           $$$$$$/   $$$$$$/   $$$$$$/   $$$$$$/  
                                                                                                                           
                                                                                                                           
                                                                                                                           

Exploit By : Khaled Alenazi (Nxploited ) GitHub: https://github.com/Nxploited

usage: CVE-2025-6058.py [-h] -u URL

CVE-2025-6058 WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload | by Khaled Alenazi (Nxploited)

options:
  -h, --help     show this help message and exit
  -u, --url URL  Target URL e.g http(s)://target.com/wordpress
```

---

## 📤 Output

```
[*] Checking plugin version ...
[*] Exploiting file upload ...
[+] Exploitation successful!
[+] Shell path: wp-content/uploads/2025/07/shell.php?cmd=whoami
Exploit By : Khaled Alenazi (Nxploited ) GitHub: https://github.com/Nxploited
```

---

## ⚠️ Disclaimer

This tool is provided for **educational and authorized security testing purposes only**.  
The author is not responsible for any misuse or unauthorized activity.  
**Use at your own risk and always ensure you have permission to test the target system.**

---

**_By: Khaled Alenazi (Nxploited)_**
文件快照

[4.0K] /data/pocs/96a0d3d6e81b56c9939b80fcbf913f44962a2f60 ├── [5.0K] CVE-2025-6058.py ├── [1.1K] LICENSE ├── [3.7K] README.md └── [ 9] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。