POC详情: f3ff884376c5dd9d0aab655f8fd7322c23ca4d34

来源
关联漏洞
标题: WordPress plugin Appy Pie Connect for WooCommerce 安全漏洞 (CVE-2025-9286)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin Appy Pie Connect for WooCommerce 1.1.2及之前版本存在安全漏洞,该漏洞源于缺少授权检查,可能导致权限提升。
描述
Appy Pie Connect for WooCommerce <= 1.1.2 - Missing Authorization to Unauthenticated Privilege Escalation
介绍
# CVE-2025-9286
Appy Pie Connect for WooCommerce &lt;= 1.1.2 - Missing Authorization to Unauthenticated Privilege Escalation
# ⚠️ Appy Pie Connect for WooCommerce <= 1.1.2 - Missing Authorization to Unauthenticated Privilege Escalation via reset_user_password

## 📝 Description

The Appy Pie Connect for WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the `reset_user_password()` REST handler in all versions up to, and including, 1.1.2.  
This makes it possible for unauthenticated attackers to reset the password of arbitrary users, including administrators, thereby gaining administrative access.

- **CVE:** CVE-2025-9286  
- **CVSS:** 9.8 (Critical)

---

## 💻 Exploit Script

The following exploit can be used to leverage CVE-2025-9286 against WordPress sites running the vulnerable plugin version.

**Script Name:** `CVE-2025-9286.py`

### ⚙️ Usage

```bash
python CVE-2025-9286.py -u http://nxploit.ddev.site/ -id 1
```

### 🟢 Sample Output (Successful Exploitation)

```
[+] Checking plugin version: http://nxploit.ddev.site/wp-content/plugins/appy-pie-connect-for-woocommerce/readme.txt
[!] Vulnerable plugin detected (1.1.2). Attempting exploitation...
[*] Please wait, attempting to change password...
[+] Exploit successful! Password has been reset.
[*] New password: Nxploited
[+] Vulnerability exploited and password changed successfully.
```

---

## 📬 Contact & Community

- 📨 **Telegram:** [@Kxploit](https://t.me/Kxploit)
- 📡 **Telegram Channel:** [@KNxploited](https://t.me/KNxploited)

---

## ⚠️ Disclaimer

This exploit is for **educational and authorized penetration testing** purposes only.  
Unauthorized use against systems without explicit permission is illegal.  
The author is not responsible for any misuse or damage caused by this tool.

---

***By: Khaled Alenazi (Nxploited)***
文件快照

[4.0K] /data/pocs/f3ff884376c5dd9d0aab655f8fd7322c23ca4d34 ├── [4.4K] CVE-2025-9286.py ├── [1.5K] LICENSE ├── [1.9K] README.md └── [ 18] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。