module

WordPress Plugin Automatic Config Change to RCE

Disclosed
Sep 6, 2021
Created
Nov 5, 2021

Description

This module exploits an unauthenticated arbitrary wordpress options change vulnerability
in the Automatic (wp-automatic) plugin address will be changed. User registration is
enabled, and default user role is set to administrator. A user is then created with
the USER name set. A valid EMAIL is required to get the registration email (not handled in MSF).

Authors

h00die
Jerome Bruandet

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/admin/http/wp_automatic_plugin_privesc
msf auxiliary(wp_automatic_plugin_privesc) > show actions
...actions...
msf auxiliary(wp_automatic_plugin_privesc) > set ACTION < action-name >
msf auxiliary(wp_automatic_plugin_privesc) > show options
...show and set options...
msf auxiliary(wp_automatic_plugin_privesc) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.