Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-35314 PoC — WonderCMS 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:WonderCMS 操作系统命令注入漏洞 (CVE-2020-35314)
Description:A remote code execution vulnerability in the installUpdateThemePluginAction function in index.php in WonderCMS 3.1.3, allows remote attackers to upload a custom plugin which can contain arbitrary code and obtain a webshell via the theme/plugin installer.
Description
WonderCMS 3.1.3 - Authenticated Remote Code Execution
Readme
<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35314">CVE-2020-35314</a> - Authenticated Remote Code Execution in WonderCMS 3.1.3

This repository was created with the goal of testing Remote Code Execution vulnerability on WonderCMS v3.1.3.
This fake plugin includes a backdoor php shell, which is located in the file evil.php.

It is recommended avoid using this fake plugin on your production web server.

![image](https://user-images.githubusercontent.com/55032920/193392452-12394988-88a2-49b4-af6a-47ccdf3b1e49.png)
File Snapshot

[4.0K] /data/pocs/89763a1e1bbc31917333c9d6eda3d293977114aa └── [ 525] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →