Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-47504 PoC — WordPress Elementor plugin <= 3.16.4 - Auth. Arbitrary Attachment Read vulnerability

Source
Associated Vulnerability
Title:WordPress Elementor plugin <= 3.16.4 - Auth. Arbitrary Attachment Read vulnerability (CVE-2023-47504)
Description:Improper Authentication vulnerability in Elementor Elementor Website Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Elementor Website Builder: from n/a through 3.16.4.
Readme
# CVE-2023-47504 POC

Exploit for CVE-2023-47504.
According to NIST, this vulnerability should allow unauthenticated users to access functionalities in the Elementor Website Builder Plugin.
Based on my research into the vulnerability, and also judging by the URL from Patchstack that describes the vulnerability: `https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-16-4-contributor-arbitrary-attachment-read-vulnerability?_s_id=cve`, I recon this is actually requires credentials for at least a subscriber account.
Also, for the exploit to work one needs access to the `wp-config.php` file of the target website. 

## Requirements

1. Credentials for at least a subscriber account
2. Access to `wp-config.php`
3. Authorization to exploit the website ;)

## Usage

1. Proxy your traffic to burp, or use the browser's developers tool to intercept requests;
1. Go to `wp-admin/profile.php` and update your profile;
1. Get the `wordpress_logged_in_*` cookie and your user id from the request;
1. The required salt is the NONCE\_KEY + NONCE\_SALT string from `wp-config.php`
1. `python exploit.py --target <TARGET> --wordpress-cookie <COPIED COOKIE> --uid <COPIED USER ID> --salt <COPIED SALT>`;
1. If the target is vulnerable the elementor cache of the website will be deleted (files under `/wp-content/uploads/elementor/css`);

File Snapshot

[4.0K] /data/pocs/35f6f73712c2ea29e930af5231f24d26c07584ac ├── [2.4K] exploit.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →