Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-32243 PoC — WordPress Essential Addons for Elementor Plugin 5.4.0-5.7.1 is vulnerable to Privilege Escalation

Source
Associated Vulnerability
Title:WordPress Essential Addons for Elementor Plugin 5.4.0-5.7.1 is vulnerable to Privilege Escalation (CVE-2023-32243)
Description:Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1.
Description
Identifies domains which run WordPress and tests against vulnerabilities (CVE-2023-32243) / #VU76395 / etc...
Readme
# Wordpress-Vulnerability-Identification-Scripts
Identifies domains which run WordPress and tests against vulnerabilities (CVE-2023-32243) / #VU76395 / etc...


wp_identifier.py ===> <br>
Input: File containing list of domains / sub-domains <br>
Output: List of domains hosting WordPress application <br>

CVE-2023-32243 ===> <br>
Input: List of domains hosting WordPress application <br>
Output: Domains affected by CVE-2023-32243 <br>

wp_spoofing_vuln_identifier.py ===> <br>
Input: List of domains hosting WordPress application <br>
Output: Domains hosting WordPress vulnerable software versions (6.0 - 6.0.4) and (5.9 - 5.9.6) <br>
File Snapshot

[4.0K] /data/pocs/28d6ba574e0a63d443ff2e6ebb624745a38c7c56 ├── [4.0K] CVE-2023-32243 │   └── [8.9K] exploit.py ├── [ 637] README.md ├── [1.3K] wp_identifier.py └── [2.2K] wp_spoofing_vuln_identifier.py 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →