
π¨ CVE-2025-4631 – Profitori WordPress Plugin Privilege Escalation Exploit π Vulnerability Summary Profitori Plugin (versions 2.0.6.0 to 2.1.1.3) is vulnerable to unauthenticated privilege escalation due to a missing capability check in the /wp-json/stocktend/v1/stocktend_object endpoint. This allows remote attackers to escalate the privileges of existing users (or create new ones) by directly manipulating the wp_capabilities meta field. CVE: CVE-2025-4631 CVSS Score: 9.8 (Critical) Published: May 30, 2025 Last Updated: May 31, 2025 π οΈ What This Script Does This Python exploit automates the privilege escalation process by: β
Checking the plugin version via the readme.txt file. π Exploiting the vulnerable REST API endpoint if a vulnerable version is detected. π‘ Sending the payload to escalate a userβs privileges to Administrator. π§Ύ Printing formatted, detailed results including the modified userβs credentials. If the version check fails, the exploit proceeds cautiously with a warning. πΈ Exploit Proof π» Usage bash usage: CVE-2025-4631.py [-h] -u URL -id ID [–email EMAIL] [–name NAME] [–url_field URL_FIELD] [–verbose] Example: bash python CVE-2025-4631.py -u https://nxploit.ddev.site -id 3 Sample Output: “` [π] Checking plugin version at: https://nxploit.ddev.site/wp-content/plugins/profitori/readme.txt [β
] Vulnerable version detected: 2.1.1.3 [π] Exploiting in 3 seconds… [π‘] Sending privilege escalation request to:…Read More
References
Back to Main