A script to exploit the unauthenticated arbitrary file upload vulnerability (CVE-2020-25213) in WP-file-manager WordPress plugin versions below 6.9.
https://medium.com/@mansoorr/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8
This tool is used by security researchers and penetration testers to verify and demonstrate the exploitation of the CVE-2020-25213 vulnerability in WP-file-manager WordPress plugins. It helps assess whether a WordPress site is vulnerable to arbitrary file upload attacks that could lead to full system compromise. The tool can also be used to automate vulnerability checks and proof-of-concept exploits.
This tool is intended for authorized security testing only; unauthorized use may cause legal issues and damage. The author disclaims responsibility for misuse. Users should obtain written consent before exploiting any target. The tool is based on public vulnerability disclosures and is designed to help understand exploit development.
git clone https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213.git
chmod +x wp-file-manager-CVE-2020-25213/wp-file-manager-exploit.sh
./wp-file-manager-exploit.sh --wp_url https://www.example.com/wordpress --check
Checks if the target WordPress site has the vulnerable endpoint and fingerprint without uploading any file.
./wp-file-manager-exploit.sh --wp_url https://wordpress.example.com/ -f /tmp/php_hello.php --verbose
Uploads the specified local file (/tmp/php_hello.php) to the target WordPress site with verbose output showing the curl command executed.