Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/codeb0ss/cve-2023-45603-poc

Mass Exploit - CVE-2023-45603 - Wordpress/plugin/user-submitted-posts < Unauthenticated Arbitrary File Upload/Exploit
https://github.com/codeb0ss/cve-2023-45603-poc

codeb0ss codeboss cve-2023-45603 cve-2023-45603-exp cve-2023-45603-exploit cve-2023-45603-poc cve-2023-45603-wp kurd wordpress wordpress-plugin

Last synced: about 1 month ago
JSON representation

Mass Exploit - CVE-2023-45603 - Wordpress/plugin/user-submitted-posts < Unauthenticated Arbitrary File Upload/Exploit

Awesome Lists containing this project

README

        

# CVE-2023-45603-
Mass Exploit - CVE-2023-45603 < Unauthenticated Arbitrary File Upload/Exploit

Platform : Wordpress
Plugin : user-submitted-posts

Vulnerable versions : 20230902

CVE : CVE-2023-45603

VulnType : Arbitrary File Upload/Webshell Upload

Required privilege : Unauthenticated

Exploit Author : t.me/codeb0ss

Active installations : 20K+

Dork : inurl: wp-content/plugins/user-submitted-posts

![Screenshot 2023-10-15 050127](https://github.com/codeb0ss/CVE-2023-45603-PoC/assets/135759201/6c00657c-420c-4ad5-9941-64b23579887f)

Exploit Proof:

![Screenshot 2023-10-15 043836](https://github.com/codeb0ss/CVE-2023-45603-PoC/assets/135759201/591a2566-709b-4efa-8e20-92d0eb9e2375)

**Important : To Buy The Exploits Source Code and The Exploit Poc < Connect With t.me/codeb0ss**

[This is published for educational and informational purposes only
and the developers accept no responsibility for the use of it by users]