Exploit for CVE-2025-4631
Discription

image
🚨 CVE-2025-4631 – Profitori WordPress Plugin Privilege Escalation Exploit πŸ“Œ Vulnerability Summary Profitori Plugin (versions 2.0.6.0 to 2.1.1.3) is vulnerable to unauthenticated privilege escalation due to a missing capability check in the /wp-json/stocktend/v1/stocktend_object endpoint. This allows remote attackers to escalate the privileges of existing users (or create new ones) by directly manipulating the wp_capabilities meta field. CVE: CVE-2025-4631 CVSS Score: 9.8 (Critical) Published: May 30, 2025 Last Updated: May 31, 2025 πŸ› οΈ What This Script Does This Python exploit automates the privilege escalation process by: βœ… Checking the plugin version via the readme.txt file. πŸš€ Exploiting the vulnerable REST API endpoint if a vulnerable version is detected. πŸ“‘ Sending the payload to escalate a user’s privileges to Administrator. 🧾 Printing formatted, detailed results including the modified user’s credentials. If the version check fails, the exploit proceeds cautiously with a warning. πŸ“Έ Exploit Proof πŸ’» Usage bash usage: CVE-2025-4631.py [-h] -u URL -id ID [–email EMAIL] [–name NAME] [–url_field URL_FIELD] [–verbose] Example: bash python CVE-2025-4631.py -u https://nxploit.ddev.site -id 3 Sample Output: “` [πŸ“„] Checking plugin version at: https://nxploit.ddev.site/wp-content/plugins/profitori/readme.txt [βœ…] Vulnerable version detected: 2.1.1.3 [πŸš€] Exploiting in 3 seconds… [πŸ“‘] Sending privilege escalation request to:…Read More

Back to Main

Subscribe for the latest news: