Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-20148 PoC — WordPress 安全漏洞

Source
Associated Vulnerability
Title:WordPress 安全漏洞 (CVE-2018-20148)
Description:In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct PHP object injection attacks via crafted metadata in a wp.getMediaItem XMLRPC call. This is caused by mishandling of serialized data at phar:// URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.
Description
Exploit for CVE-2018-20148 - WordPress PHAR deserialization via XMLRPC
File Snapshot

[4.0K] /data/pocs/bb1597af9e7b141f345cbe9a2d717dbf0be3ef33 ├── [5.5K] CVE-2018-20148_exploit.py ├── [ 463] getMediaItem.xml ├── [ 28K] hacker.jpg ├── [ 22K] image.jpg └── [ 727] uploadFile.xml 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →