WordPress SP Project And Document Remote Code Execution
Posted by deepcore on July 27, 2021 – 5:31 am
This Metasploit module allows an attacker with a privileged WordPress account to launch a reverse shell due to an arbitrary file upload vulnerability in WordPress SP Project and Document plugin versions prior to 4.22. The security check only searches for lowercase file extensions such as .php, making it possible to upload .pHP files for instance. Finally, the uploaded payload can be triggered by a call to /wp-content/uploads/sp-client-document-manager//.php.
Post a reply
You must be logged in to post a comment.