Skip to content

Commit e06dd6d

Browse files
committed
Update documentation
1 parent 9c8db05 commit e06dd6d

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

documentation/modules/exploit/multi/http/wp_time_capsule_file_upload_rce.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,10 @@ To replicate a vulnerable environment for testing:
99
2. Download and install the [WP Time Capsule plugin v1.22.21](https://downloads.wordpress.org/plugin/wp-time-capsule.1.22.21.zip).
1010
3. Verify that the plugin is activated and accessible on the local network.
1111
4. Register for a WP Time Capsule account and connect the plugin to an external storage system (e.g., Google Drive, Dropbox).
12-
5. Access `wp-admin/admin.php?page=wp-time-capsule-settings#wp-time-capsule-tab-advanced`
13-
to enable the vulnerable functionality by clicking **"Click here to show upload options"**.
12+
5. Access `wp-admin/admin.php?page=wp-time-capsule-settings#wp-time-capsule-tab-advanced` to enable the **file upload functionality**
13+
by clicking **"Click here to show upload options"**.
14+
This action triggers the `prepare_file_upload_index_file_wptc` function, which creates the required `index.php` file
15+
in the `/wp-tcapsule-bridge/upload/php/` directory, making the issue exploitable.
1416

1517
## Docker Compose Configuration
1618

0 commit comments

Comments
 (0)