Rapid7 Vulnerability & Exploit Database

WordPress WPLMS Theme Privilege Escalation

Back to Search

WordPress WPLMS Theme Privilege Escalation

Disclosed
02/09/2015
Created
05/30/2018

Description

The WordPress WPLMS theme from version 1.5.2 to 1.8.4.1 allows an authenticated user of any user level to set any system option due to a lack of validation in the import_data function of /includes/func.php. The module first changes the admin e-mail address to prevent any notifications being sent to the actual administrator during the attack, re-enables user registration in case it has been disabled and sets the default role to be administrator. This will allow for the user to create a new account with admin privileges via the default registration page found at /wp-login.php?action=register.

Author(s)

  • Evex
  • rastating

Development

References

  • WPVDB-7785

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/http/wp_wplms_privilege_escalation
msf auxiliary(wp_wplms_privilege_escalation) > show actions
    ...actions...
msf auxiliary(wp_wplms_privilege_escalation) > set ACTION < action-name >
msf auxiliary(wp_wplms_privilege_escalation) > show options
    ...show and set options...
msf auxiliary(wp_wplms_privilege_escalation) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;