关联漏洞
标题:
WordPress plugin Profitori 授权问题漏洞
(CVE-2025-4631)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Profitori 2.0.6.0至2.1.1.3版本存在授权问题漏洞,该漏洞源于缺少能力检查,可能导致权限提升。
描述
Profitori 2.0.6.0 - 2.1.1.3 - Missing Authorization to Unauthenticated Privilege Escalation
介绍
## 🚨 CVE-2025-4631 - Profitori WordPress Plugin Privilege Escalation Exploit
### 📌 Vulnerability Summary
**Profitori Plugin (versions 2.0.6.0 to 2.1.1.3)** is vulnerable to **unauthenticated privilege escalation** due to a missing capability check in the `/wp-json/stocktend/v1/stocktend_object` endpoint. This allows remote attackers to escalate the privileges of existing users (or create new ones) by directly manipulating the `wp_capabilities` meta field.
- **CVE**: CVE-2025-4631
- **CVSS Score**: 9.8 (Critical)
- **Published**: May 30, 2025
- **Last Updated**: May 31, 2025
---
## 🛠️ What This Script Does
This Python exploit automates the privilege escalation process by:
1. ✅ Checking the plugin version via the `readme.txt` file.
2. 🚀 Exploiting the vulnerable REST API endpoint if a vulnerable version is detected.
3. 📡 Sending the payload to escalate a user’s privileges to Administrator.
4. 🧾 Printing formatted, detailed results including the modified user’s credentials.
If the version check fails, the exploit proceeds cautiously with a warning.
---
## 📸 Exploit Proof

---
## 💻 Usage
```bash
usage: CVE-2025-4631.py [-h] -u URL -id ID [--email EMAIL] [--name NAME] [--url_field URL_FIELD] [--verbose]
```
### Example:
```bash
python CVE-2025-4631.py -u http://nxploit.ddev.site -id 3
```
### Sample Output:
```
[📄] Checking plugin version at: http://nxploit.ddev.site/wp-content/plugins/profitori/readme.txt
[✅] Vulnerable version detected: 2.1.1.3
[🚀] Exploiting in 3 seconds...
[📡] Sending privilege escalation request to: http://nxploit.ddev.site/wp-json/stocktend/v1/stocktend_object
[🎯] Exploit completed successfully!
[🧾] Updated User Information:
--------------------------------------
🆔 User ID : 3
👤 Username : subscriber
📧 Email : subscriber@example.com
🪪 Display Name : Subscriber User
🔗 User URL :
🛡 Role Raw : a:1:{s:13:"administrator";b:1;}
[👑] Exploit By : Nxploited (Khaled_alenazi)
🔗 GitHub : https://github.com/Nxploited
📧 Email : NxploitBot@gmal.com
```
---
## ⚙️ Script Arguments
| Flag | Description | Required |
|--------------------|--------------------------------------------------|----------|
| `-u`, `--url` | 🌐 Base URL of the WordPress site | ✅ Yes |
| `-id` | 🆔 ID of the user to escalate | ✅ Yes |
| `--email` | 📧 Fake email to display | ❌ No |
| `--name` | 👤 Display name | ❌ No |
| `--url_field` | 🔗 User URL field | ❌ No |
| `--verbose` | 🔍 Print full JSON response | ❌ No |
---
## 📂 Requirements
- Python 3.x
- `requests` library
Install via:
```bash
pip install requests
```
---
## ⚠️ Disclaimer
This tool is provided for **educational and authorized testing purposes only**. Any misuse of this exploit against systems you do not own or have explicit permission to test is **strictly prohibited**. The creator is not responsible for any damages or legal consequences arising from improper usage.
---
*BY: Nxploited ( Khaled_Alenazi )*
文件快照
[4.0K] /data/pocs/f4fedabd79829322b56780c1efecedc4824d7766
├── [4.0K] CVE-2025-4631.py
├── [1.1K] LICENSE
├── [265K] nxploit_poc.PNG
└── [3.3K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。