Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25076 PoC — WordPress plugin SQL注入漏洞

Source
Associated Vulnerability
Title:WordPress plugin SQL注入漏洞 (CVE-2021-25076)
Description:WordPress plugin是WordPress开源的一个应用插件。 WordPress plugin WP User Frontend 存在SQL注入漏洞,该漏洞源于3.5.26之前的WP User Frontend WordPress插件在订阅服务器仪表板中的SQL语句中使用状态参数之前,不会验证和转义该参数,从而导致SQL注入。
Description
Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)
Readme
# CVE-2021-25076-Exploit
### Wordpress Plugin WP User Frontend < 3.5.26 - SQL-Injection (Authenticated)

## CVE description:
The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter
before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection.
Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting
- https://nvd.nist.gov/vuln/detail/CVE-2021-25076

## ExploitDB:
- https://www.exploit-db.com/exploits/50772
  
## Exploit Description:
- Vendor Homepage: https://wedevs.com/
- Software Link: https://downloads.wordpress.org/plugin/wp-user-frontend.3.5.25.zip
- Version: Up to 3.5.25
- Tested on Ubuntu 20.04

- 🕊️ Twitter: [@0xAbbarhSF](https://twitter.com/0xAbbarhSF)
[![Tweet](https://img.shields.io/twitter/url/http/0xAbbarhSF.svg?style=social)](https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fdeveloper.twitter.com%2Fen%2Fdocs%2Ftwitter-for-websites%2Ftweet-button%2Foverview&ref_src=twsrc%5Etfw&text=CMS-Xploiter%20-%20Automated%20Pentest%20Recon%20Scanner%20%400xAbbarhSD&tw_p=tweetbutton&url=https%3A%2F%2Fgithub.com%2F0xAbbarhSF%)

File Snapshot

[4.0K] /data/pocs/a28b03573bf8dd240461440b4719024c7c7ef6c6 ├── [4.7K] exploit.py ├── [ 34K] LICENSE └── [1.2K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.