Skip to content

Nxploited/CVE-2024-7135

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

CVE-2024-7135

The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

usage

WordPress CVE-2024-7135 Wordpress Tainacan 0.21.7 Arbitrary File Read



options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Base URL of the WordPress site
  -usr USERNAME, --username USERNAME
                        WordPress username
  -p PASSWORD, --password PASSWORD
                        WordPress password
  -f FILE, --file FILE  File path to include in the nonce URL (default: wp-config.php)

pip

pip install requests
pip install beautifulsoup4


This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages