Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2015-9499 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary PHP file upload via `admin-ajax.php`. <br>πŸ’₯ **Consequences**: Unauthenticated Remote Code Execution (RCE). Attackers gain full control over the server.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Insecure file upload handling. <br>πŸ” **Flaw**: Allows `.php` file uploads without proper validation.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Showbiz Pro Plugin. <br>πŸ“‰ **Version**: **1.7.1 and earlier**. <br>🌐 **Platform**: WordPress sites running this specific plugin.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: **Unauthenticated** access. <br>πŸ’Ύ **Data**: Full server compromise. <br>⚑ **Action**: Execute arbitrary PHP code. <br>πŸ”“ **Impact**: Complete system takeover.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: **None required** (Unauthenticated). <br>βš™οΈ **Config**: Exploits `admin-ajax.php` endpoint directly. <br>🎯 **Ease**: Remote exploitation is straightforward.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp?**: **YES**. <br>πŸ“‚ **Sources**: <br>- Exploit-DB #35385 <br>- GitHub PoC (nuclei-templates) <br>- Metasploit module (wpsploit). <br>🌍 **Wild Exploitation**: High risk due to available tools.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Scan for `admin-ajax.php` upload vectors. <br>2. Check plugin version (`Showbiz Pro <= 1.7.1`). <br>3. Use Nuclei templates for detection. <br>4.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update **Showbiz Pro** to version **> 1.7.1**. <br>πŸ“… **Published**: Oct 2019. <br>βœ… **Status**: Patch available for affected versions.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: <br>1. **Disable** the plugin immediately. <br>2. **Block** `admin-ajax.php` upload permissions via WAF. <br>3. Restrict `.php` file uploads in `wp-config.php` or server config. <br>4.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL**. <br>πŸ”΄ **Priority**: **P0**. <br>⚑ **Reason**: Unauthenticated RCE with public exploits. <br>πŸƒ **Action**: Patch or disable **IMMEDIATELY**.