Simple File List 未授权远程代码执行漏洞

漏洞信息

漏洞名称: Simple File List 未授权远程代码执行漏洞

漏洞编号:

  • CVE: CVE-2025-34085

漏洞类型: 文件上传

漏洞等级: 高危

漏洞描述: Simple File List是WordPress的一个插件,用于文件列表管理,广泛应用于需要文件共享和管理的网站。该插件允许用户上传和管理文件,但在版本4.2.3及之前存在一个严重的安全漏洞。漏洞的根源在于插件对文件上传和重命名的逻辑处理不当,导致攻击者可以上传一个伪装成.png的PHP文件,然后通过重命名操作将其改为.php文件,从而执行任意代码。这种漏洞属于文件上传漏洞,具体表现为未授权远程代码执行(RCE)。攻击者无需任何认证即可利用此漏洞,上传恶意文件并执行任意命令,对网站的安全构成严重威胁。此漏洞的影响极为严重,可能导致网站被完全控制,数据泄露,甚至被用作攻击其他系统的跳板。由于攻击过程可以完全自动化,且不需要任何用户交互,因此该漏洞的利用门槛极低,危害性极高。

产品厂商: WordPress

产品名称: Simple File List

影响版本: <= 4.2.3

来源: https://github.com/MrjHaxcore/CVE-2025-34085

类型: CVE-2025:github search

仓库文件

  • README.md
  • simple.py

来源概述

📂 Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)

⚠️ Exploit Code by: Mrj Haxcore

A fully working Python exploit for the WordPress Simple File List plugin (<= 4.2.3), which is vulnerable to unauthenticated remote code execution (RCE) due to insecure file upload and rename logic.


💣 Vulnerability Summary

  • Plugin: Simple File List (simple-file-list)
  • Version: <= 4.2.3
  • CVE: CVE-2025-34085
  • Impact: Unauthenticated users can upload a PHP file disguised as .png, then rename it to .php and execute arbitrary code.
  • Requirements: No authentication required
  • Exploit Type: File Upload → Rename Bypass → Command Execution

✅ Features

  • 🚀 Fully automated exploit chain
  • 📤 Manual multipart/form-data builder (bypasses 415)
  • 🔁 Rename brute-force for .php, .php5, .phtml, etc.
  • 🛡️ Realistic spoofed headers to bypass WAFs
  • 🐚 Command execution via ?cmd=
  • 🧼 Clean output (no �PNG garbage)

🛠 Usage

python3 simple.py https://target.site

[+] Uploading shell as 8dkls0qp.png...
[+] Upload successful.
[+] Trying to rename to: 8dkls0qp.php...
[+] Rename successful: 8dkls0qp.php
[+] Triggering shell: https://target.site/wp-content/uploads/simple-file-list/8dkls0qp.php?cmd=id
[+] Shell output:
uid=33(www-data) gid=33(www-data) groups=33(www-data)

Manual Visit

https://target.site/wp-content/uploads/simple-file-list/8dkls0qp.php?cmd=whoami


Simple File List 未授权远程代码执行漏洞
http://example.com/2025/07/10/github_1297581177/
作者
lianccc
发布于
2025年7月10日
许可协议