WordPress WPBookit 文件上传漏洞
漏洞信息
漏洞名称: WordPress WPBookit 文件上传漏洞
漏洞编号:
- CVE: CVE-2025-6058
漏洞类型: 文件上传
漏洞等级: 严重
漏洞描述: ### 受影响产品
WordPress是一个广泛使用的内容管理系统(CMS),全球数百万网站采用。WPBookit是WordPress的一个插件,用于提供预约和预订功能。由于其易用性和功能丰富,WPBookit在各类商业和个人网站中较为常见。
漏洞说明
CVE-2025-6058是一个影响WordPress WPBookit插件的严重漏洞,类型为未经验证的文件上传漏洞。攻击者可以利用一个易受攻击的AJAX端点上传任意PHP文件,无需任何身份验证即可实现远程代码执行(RCE)。漏洞的技术根源在于插件未能正确验证上传文件的类型和内容,导致攻击者可以上传恶意脚本。
影响分析
此漏洞允许攻击者在未经验证的情况下上传恶意PHP文件,从而获得对目标网站的完全控制。攻击者可以执行任意代码,访问敏感数据,甚至破坏网站的正常运行。由于漏洞的利用无需任何身份验证,且可以自动化执行,因此风险极高。此漏洞的存在使得使用受影响版本WPBookit插件的所有WordPress网站都面临严重的安全威胁。
产品厂商: WordPress
产品名称: WPBookit
影响版本: ≤ 1.0.4
来源: https://github.com/0xgh057r3c0n/CVE-2025-6058
类型: CVE-2025:github search
仓库文件
- .gitignore
- CVE-2025-6058.py
- CVE-2025-6058.yaml
- LICENSE
- README.md
来源概述
🚨 CVE-2025-6058 — WordPress WPBookit ≤ 1.0.4 Unauthenticated File Upload Exploit
Unauthenticated Arbitrary File Upload Exploit targeting WordPress WPBookit Plugin (≤ 1.0.4)
Exploit allows remote shell upload and full command execution.
Author: 0xgh057r3c0n
📌 About The Vulnerability
CVE-2025-6058 is a critical vulnerability affecting the WPBookit plugin on WordPress CMS. An unauthenticated attacker can abuse a vulnerable AJAX endpoint to upload arbitrary PHP files, enabling Remote Code Execution (RCE).
- 🎯 Target: WordPress CMS (vulnerable WPBookit plugin)
- 📦 Plugin Affected: WPBookit ≤ 1.0.4
- ⚠️ Risk Level: Critical (Unauthenticated RCE)
✨ Features
- 🔍 Auto-detects WordPress plugin version via
README.txt
- 📤 Uploads lightweight PHP shell (
ghost_shell.php
) - 🖥️ Interactive shell (Parrot-style prompt)
- 🌐 Unauthenticated — No login required
- 🎨 Colorized CLI Output
🚀 Usage Guide
💻 Requirements
1 |
|
🛠️ Example Shell Session
1 |
|
📂 Shell Details
- File Name:
ghost_shell.php
- Path:
/wp-content/uploads/YYYY/MM/ghost_shell.php
- Example:
1 |
|
⚠️ Legal Disclaimer
This exploit is developed for educational purposes and authorized penetration testing only. Unauthorized use against systems without explicit consent is illegal.
📄 License
Released under MIT License
Made for WordPress security auditing 🛡️ by 0xgh057r3c0n
```