Simple File List 未授权远程代码执行漏洞
漏洞信息
漏洞名称: Simple File List 未授权远程代码执行漏洞
漏洞编号:
- CVE: CVE-2025-34085
漏洞类型: 文件上传
漏洞等级: 高危
漏洞描述: Simple File List是WordPress的一个插件,用于文件列表管理,广泛应用于需要文件共享和管理的网站。该插件允许用户上传和管理文件,但在版本4.2.3及之前存在一个严重的安全漏洞。漏洞的根源在于插件对文件上传和重命名的逻辑处理不当,导致攻击者可以上传一个伪装成.png的PHP文件,然后通过重命名操作将其改为.php文件,从而执行任意代码。这种漏洞属于文件上传漏洞,具体表现为未授权远程代码执行(RCE)。攻击者无需任何认证即可利用此漏洞,上传恶意文件并执行任意命令,对网站的安全构成严重威胁。此漏洞的影响极为严重,可能导致网站被完全控制,数据泄露,甚至被用作攻击其他系统的跳板。由于攻击过程可以完全自动化,且不需要任何用户交互,因此该漏洞的利用门槛极低,危害性极高。
产品厂商: WordPress
产品名称: Simple File List
影响版本: <= 4.2.3
来源: https://github.com/MrjHaxcore/CVE-2025-34085
类型: CVE-2025:github search
仓库文件
- README.md
- simple.py
来源概述
📂 Simple File List – Unauthenticated RCE Exploit (CVE-2025-34085)
⚠️ Exploit Code by: Mrj Haxcore
A fully working Python exploit for the WordPress Simple File List plugin (<= 4.2.3), which is vulnerable to unauthenticated remote code execution (RCE) due to insecure file upload and rename logic.
💣 Vulnerability Summary
- Plugin: Simple File List (
simple-file-list
) - Version: <= 4.2.3
- CVE: CVE-2025-34085
- Impact: Unauthenticated users can upload a PHP file disguised as
.png
, then rename it to.php
and execute arbitrary code. - Requirements: No authentication required
- Exploit Type: File Upload → Rename Bypass → Command Execution
✅ Features
- 🚀 Fully automated exploit chain
- 📤 Manual
multipart/form-data
builder (bypasses 415) - 🔁 Rename brute-force for
.php
,.php5
,.phtml
, etc. - 🛡️ Realistic spoofed headers to bypass WAFs
- 🐚 Command execution via
?cmd=
- 🧼 Clean output (no
�PNG
garbage)
🛠 Usage
python3 simple.py https://target.site
[+] Uploading shell as 8dkls0qp.png...
[+] Upload successful.
[+] Trying to rename to: 8dkls0qp.php...
[+] Rename successful: 8dkls0qp.php
[+] Triggering shell: https://target.site/wp-content/uploads/simple-file-list/8dkls0qp.php?cmd=id
[+] Shell output:
uid=33(www-data) gid=33(www-data) groups=33(www-data)
Manual Visit
https://target.site/wp-content/uploads/simple-file-list/8dkls0qp.php?cmd=whoami