# π¨ CVE-2025-32583 β WordPress PDF 2 Post RCE Exploit
> **CRITICAL Vulnerability**
> **CVE-ID:** CVE-2025-32583
> **Severity:** 9.9 (CRITICAL)
> **CVSS Vector:** `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
---
## π Description
A vulnerability in the **PDF 2 Post** WordPress plugin (developed by termel) allows **Remote Code Inclusion (RCE)** due to **Improper Control of Generation of Code**.
Affected versions: `<= 2.4.0`
The flaw allows **authenticated users** (even low-privilege users) to upload a `.zip` containing PHP code. Once extracted by the plugin, the malicious PHP file may be executed remotely via a public-facing uploads directory.
---
## βοΈ Features
- β
Automatically generates malicious `gadalubau.zip`
- β
Logs in using WordPress credentials
- β
Extracts dynamic `nonce` token
- β
Uploads the payload
- β
Clean terminal output with status indicators
---
## π Shell Location
Once the payload is uploaded, the PHP shell will be extracted into the WordPress uploads folder.
π οΈ **Default path:**
```
/wp-content/uploads/YYYY/MM/gadalubau.php
```
For example, if exploited in **May 2025**, the URL would be:
```
http://target-site.com/wp-content/uploads/2025/05/gadalubau.php
```
π WordPress automatically organizes uploads by **year/month**, so ensure you check the correct folder based on the current date.
---
## π§ͺ Usage
```bash
python CVE-2025-32583.py --help
```
### Example:
```bash
python CVE-2025-32583.py -u http://target-site.com/wordpress -un admin -p admin
```
---
## π‘ Sample Output
```
Exploit By: GadaLuBau (GadaLuBau1337)
[+] Payload gadalubau.zip created successfully.
[+] Logged in successfully.
[+] Found nonce: 3c3e8fff7c
[+] Payload uploaded.
```
---
## π Script Name
```bash
CVE-2025-32583.py
```
---
## β οΈ Disclaimer
This tool is intended **strictly for educational and authorized penetration testing purposes**.
Any misuse of this code for unauthorized activities is strictly prohibited.
The author bears **no responsibility** for any damage or misuse.
---
*By: GadaLuBau (GadaLuBau1337)*
[4.0K] /data/pocs/2cb48244746702b2d50187b01406351d26ddd1cb
βββ [3.7K] CVE-2025-32583.py
βββ [2.1K] README.md
βββ [ 24] requirements.txt
0 directories, 3 files