Metasploit modules that can be used to exploit Automattic products
-
Wordpress Plugin WooCommerce Payments Unauthenticated Admin Creation
Disclosure Date: 2023-03-22First seen: 2023-09-11auxiliary/scanner/http/wp_woocommerce_payments_add_userWooCommerce-Payments plugin for Wordpress versions 4.8', '4.8.2, 4.9', '4.9.1, 5.0', '5.0.4, 5.1', '5.1.3, 5.2', '5.2.2, 5.3', '5.3.1, 5.4', '5.4.1, 5.5', '5.5.2, and 5.6', '5.6.2 contain an authentication bypass by specifying a valid user ID number within the X-WCPAY-PLATFORM-CHECKOUT-USER header. With this authentication bypass, a user can then use the API to create a new user with administrative privileges on the target WordPress site IF the user ID selected corresponds to an administrator account. Authors: - h00die - Michael Mazzolini - Julien Ahrens -
WordPress W3 Total Cache PHP Code Execution
Disclosure Date: 2013-04-17First seen: 2020-04-26exploit/unix/webapp/wp_total_cache_execThis module exploits a PHP Code Injection vulnerability against WordPress plugin W3 Total Cache for versions up to and including 0.9.2.8. WP Super Cache 1.2 or older is also reported as vulnerable. The vulnerability is due to the handling of certain macros such as mfunc, which allows arbitrary PHP code injection. A valid post ID is needed in order to add the malicious comment. If the POSTID option isn't specified, then the module will automatically find or bruteforce one. Also, if anonymous comments aren't allowed, then a valid username and password must be provided. In addition, the "A comment is held for moderation" option on WordPress must be unchecked for successful exploitation. This module has been tested against WordPress 3.5 and W3 Total Cache 0.9.2.3 on a Ubuntu 10.04 system. Authors: - Unknown - juan vazquez <juan.vazquez@metasploit.com> - hdm <x@hdm.io> - Christian Mehlmauer <FireFart@gmail.com>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details