Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/codeb0ss/cve-2023-45603-poc
Mass Exploit - CVE-2023-45603 - Wordpress/plugin/user-submitted-posts < Unauthenticated Arbitrary File Upload/Exploit
https://github.com/codeb0ss/cve-2023-45603-poc
codeb0ss codeboss cve-2023-45603 cve-2023-45603-exp cve-2023-45603-exploit cve-2023-45603-poc cve-2023-45603-wp kurd wordpress wordpress-plugin
Last synced: about 1 month ago
JSON representation
Mass Exploit - CVE-2023-45603 - Wordpress/plugin/user-submitted-posts < Unauthenticated Arbitrary File Upload/Exploit
- Host: GitHub
- URL: https://github.com/codeb0ss/cve-2023-45603-poc
- Owner: codeb0ss
- Created: 2023-10-15T01:57:25.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-10-15T02:16:29.000Z (over 1 year ago)
- Last Synced: 2024-11-13T02:14:52.301Z (3 months ago)
- Topics: codeb0ss, codeboss, cve-2023-45603, cve-2023-45603-exp, cve-2023-45603-exploit, cve-2023-45603-poc, cve-2023-45603-wp, kurd, wordpress, wordpress-plugin
- Language: Python
- Homepage:
- Size: 815 KB
- Stars: 5
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2023-45603-
Mass Exploit - CVE-2023-45603 < Unauthenticated Arbitrary File Upload/ExploitPlatform : Wordpress
Plugin : user-submitted-postsVulnerable versions : 20230902
CVE : CVE-2023-45603
VulnType : Arbitrary File Upload/Webshell Upload
Required privilege : Unauthenticated
Exploit Author : t.me/codeb0ss
Active installations : 20K+
Dork : inurl: wp-content/plugins/user-submitted-posts
![Screenshot 2023-10-15 050127](https://github.com/codeb0ss/CVE-2023-45603-PoC/assets/135759201/6c00657c-420c-4ad5-9941-64b23579887f)
Exploit Proof:
![Screenshot 2023-10-15 043836](https://github.com/codeb0ss/CVE-2023-45603-PoC/assets/135759201/591a2566-709b-4efa-8e20-92d0eb9e2375)
**Important : To Buy The Exploits Source Code and The Exploit Poc < Connect With t.me/codeb0ss**
[This is published for educational and informational purposes only
and the developers accept no responsibility for the use of it by users]