Rapid7 Vulnerability & Exploit Database

WordPress WPLMS Theme Privilege Escalation

Back to Search

WordPress WPLMS Theme Privilege Escalation



The WordPress WPLMS theme from version 1.5.2 to allows an authenticated user of any user level to set any system option due to a lack of validation in the import_data function of /includes/func.php. The module first changes the admin e-mail address to prevent any notifications being sent to the actual administrator during the attack, re-enables user registration in case it has been disabled and sets the default role to be administrator. This will allow for the user to create a new account with admin privileges via the default registration page found at /wp-login.php?action=register.


  • Evex
  • rastating


Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/http/wp_wplms_privilege_escalation
msf auxiliary(wp_wplms_privilege_escalation) > show actions
msf auxiliary(wp_wplms_privilege_escalation) > set ACTION < action-name >
msf auxiliary(wp_wplms_privilege_escalation) > show options
    ...show and set options...
msf auxiliary(wp_wplms_privilege_escalation) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security