Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-4133 PoC — WordPress ReFlex Gallery插件代码注入漏洞

Source
Associated Vulnerability
Title:WordPress ReFlex Gallery插件代码注入漏洞 (CVE-2015-4133)
Description:WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。ReFlex Gallery是其中的一个合二为一的图库相册插件。 WordPress ReFlex Gallery插件3.1.4之前版本中的admin/scripts/FileUploader/php.php脚本中存在任意文件上传漏洞。远程攻击者可利用该漏洞执行任意PHP代码。
Description
POC exploit for CVE-2015-4133
Readme
# CVE-2015-4133

CVE 2015-4133 - Reflex Gallery 3.1.3 Arbitrary File Upload to RCE

# Description

Reflex Gallery is a Wordpress plugins which has a vulnerability on its 3.1.3 version which can be exploited easily by attackers to upload arbitrary files, for example PHP code to achieve Remote Command Execution

```
# Exploit Title: Wordpress Plugin Reflex Gallery - Arbitrary File Upload
# Google Dork: inurl:wp-content/plugins/reflex-gallery/
# Date: 08.03.2015
# Discovered by: CrashBandicot @DosPerl
# CVE: CVE-2015-4133
# Vendor Homepage: https://wordpress.org/plugins/reflex-gallery/
# Software Link: https://downloads.wordpress.org/plugin/reflex-gallery.zip
# Version: 3.1.3
# Tested on: Linux
```

# Usage

The usage of the exploit is really easy. You just have to specify the WordPress base URL to the `-u` parameter and it will do all the dirty work for you. It will upload a PHP file and spawn a interactive fake-shell to execute commands remotely

```sh
python3 CVE-2015-4133.py -u http://target.com/wordpress/
```

If you receive errors try to change the number **2022** from script to any other existent year in the /wp-content/uploads/ folder

# Demo

<img src="demo.png">

# References

```
https://www.exploit-db.com/exploits/36374
https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_reflexgallery_file_upload/
https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-reflex-gallery-arbitrary-file-upload-3-1-3/
https://patchstack.com/database/wordpress/plugin/reflex-gallery/vulnerability/wordpress-reflex-gallery-plugin-3-1-3-unrestricted-file-upload
https://wpscan.com/vulnerability/c2496b8b-72e4-4e63-9d78-33ada3f1c674/
```

# License

This project is under MIT license

Copyright © 2025, *D3Ext*

File Snapshot

[4.0K] /data/pocs/b07340defd1b58a22c3740770577b1c34a66288d ├── [6.0K] CVE-2015-4133.py ├── [ 28K] demo.png ├── [1.0K] LICENSE └── [1.7K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.