Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-12895 PoC — WordPress 路径遍历漏洞

Source
Associated Vulnerability
Title:WordPress 路径遍历漏洞 (CVE-2018-12895)
Description:WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.
Description
Hotfix for file deletion to to code execution vulnerability in WordPress
File Snapshot

[4.0K] /data/pocs/3560ef48bf7d33e740e21c643d6b9e7534f8bdb3 ├── [ 482] composer.json ├── [5.1K] composer.lock └── [ 534] cve-2018-12895-hotfix.php 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →