@@ -108747,6 +108747,67 @@
108747108747 "session_types": false,
108748108748 "needs_cleanup": true
108749108749 },
108750+ "exploit_multi/http/wp_user_registration_membership_escalation": {
108751+ "name": "WP User Registration and Membership Unauthenticated Privilege Escalation (CVE-2025-2563)",
108752+ "fullname": "exploit/multi/http/wp_user_registration_membership_escalation",
108753+ "aliases": [],
108754+ "rank": 600,
108755+ "disclosure_date": "2025-03-24",
108756+ "type": "exploit",
108757+ "author": [
108758+ "wesley (wcraft)",
108759+ "Valentin Lobstein"
108760+ ],
108761+ "description": "Exploits CVE-2025-2563 in the WordPress User Registration & Membership plugin.\n 1) Registers a free-membership user via AJAX.\n 2) Elevates that user to administrator via the membership AJAX action.\n 3) Logs in, uploads & executes a PHP payload.",
108762+ "references": [
108763+ "CVE-2025-2563",
108764+ "WPVDB-2c0f62a1-9510-4f90-a297-17634e6c8b75",
108765+ "URL-https://pentest-tools.com/vulnerabilities-exploits/user-registration-and-membership-411-unauthenticated-privilege-escalation_26968"
108766+ ],
108767+ "platform": "Linux,PHP,Unix,Windows",
108768+ "arch": "php, cmd",
108769+ "rport": 80,
108770+ "autofilter_ports": [
108771+ 80,
108772+ 8080,
108773+ 443,
108774+ 8000,
108775+ 8888,
108776+ 8880,
108777+ 8008,
108778+ 3000,
108779+ 8443
108780+ ],
108781+ "autofilter_services": [
108782+ "http",
108783+ "https"
108784+ ],
108785+ "targets": [
108786+ "PHP In-Memory",
108787+ "Unix In-Memory",
108788+ "Windows In-Memory"
108789+ ],
108790+ "mod_time": "2025-05-13 21:48:49 +0000",
108791+ "path": "/modules/exploits/multi/http/wp_user_registration_membership_escalation.rb",
108792+ "is_install_path": true,
108793+ "ref_name": "multi/http/wp_user_registration_membership_escalation",
108794+ "check": true,
108795+ "post_auth": true,
108796+ "default_credential": false,
108797+ "notes": {
108798+ "Stability": [
108799+ "crash-safe"
108800+ ],
108801+ "SideEffects": [
108802+ "ioc-in-logs"
108803+ ],
108804+ "Reliability": [
108805+ "repeatable-session"
108806+ ]
108807+ },
108808+ "session_types": false,
108809+ "needs_cleanup": true
108810+ },
108750108811 "exploit_multi/http/wso2_api_manager_file_upload_rce": {
108751108812 "name": "WSO2 API Manager Documentation File Upload Remote Code Execution",
108752108813 "fullname": "exploit/multi/http/wso2_api_manager_file_upload_rce",
0 commit comments