Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-32583 PoC β€” WordPress PDF 2 Post Plugin <= 2.4.0 - Remote Code Execution (RCE) vulnerability

Source
Associated Vulnerability
Title:WordPress PDF 2 Post Plugin <= 2.4.0 - Remote Code Execution (RCE) vulnerability (CVE-2025-32583)
Description:Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post pdf2post allows Remote Code Inclusion.This issue affects PDF 2 Post: from n/a through <= 2.4.0.
Readme

# 🚨 CVE-2025-32583 β€” WordPress PDF 2 Post RCE Exploit

> **CRITICAL Vulnerability**  
> **CVE-ID:** CVE-2025-32583  
> **Severity:** 9.9 (CRITICAL)  
> **CVSS Vector:** `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`  

---

## πŸ“– Description

A vulnerability in the **PDF 2 Post** WordPress plugin (developed by termel) allows **Remote Code Inclusion (RCE)** due to **Improper Control of Generation of Code**.  
Affected versions: `<= 2.4.0`

The flaw allows **authenticated users** (even low-privilege users) to upload a `.zip` containing PHP code. Once extracted by the plugin, the malicious PHP file may be executed remotely via a public-facing uploads directory.

---

## βš™οΈ Features

- βœ… Automatically generates malicious `gadalubau.zip`
- βœ… Logs in using WordPress credentials
- βœ… Extracts dynamic `nonce` token
- βœ… Uploads the payload
- βœ… Clean terminal output with status indicators

---

## πŸ“‚ Shell Location

Once the payload is uploaded, the PHP shell will be extracted into the WordPress uploads folder.  
πŸ› οΈ **Default path:**
```
/wp-content/uploads/YYYY/MM/gadalubau.php
```
For example, if exploited in **May 2025**, the URL would be:
```
http://target-site.com/wp-content/uploads/2025/05/gadalubau.php
```
πŸ•“ WordPress automatically organizes uploads by **year/month**, so ensure you check the correct folder based on the current date.

---

## πŸ§ͺ Usage

```bash
python CVE-2025-32583.py --help
```

### Example:
```bash
python CVE-2025-32583.py -u http://target-site.com/wordpress -un admin -p admin
```

---

## πŸ’‘ Sample Output

```
Exploit By: GadaLuBau (GadaLuBau1337)
[+] Payload gadalubau.zip created successfully.
[+] Logged in successfully.
[+] Found nonce: 3c3e8fff7c
[+] Payload uploaded.
```

---

## πŸ“ Script Name

```bash
CVE-2025-32583.py
```

---

## ⚠️ Disclaimer

This tool is intended **strictly for educational and authorized penetration testing purposes**.  
Any misuse of this code for unauthorized activities is strictly prohibited.  
The author bears **no responsibility** for any damage or misuse.

---

*By: GadaLuBau (GadaLuBau1337)*
File Snapshot

[4.0K] /data/pocs/2cb48244746702b2d50187b01406351d26ddd1cb β”œβ”€β”€ [3.7K] CVE-2025-32583.py β”œβ”€β”€ [2.1K] README.md └── [ 24] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers β€” if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online β€” thank you for the support. View subscription plans β†’