## https://sploitus.com/exploit?id=14934D64-AA8A-551A-95A8-24A1A2D6739F
# ๐จ CVE-2025-2266 โ WordPress Plugin Exploit
## ๐ Vulnerability Summary
The **Checkout Mestres do WP for WooCommerce** plugin for WordPress is affected by an **unauthenticated arbitrary options update vulnerability** in versions `8.6.5` through `8.7.5`.
The vulnerable function `cwmpUpdateOptions()` lacks proper capability checks, allowing **unauthenticated attackers** to update arbitrary WordPress options.
### โ ๏ธ Risk & Exploitation
An attacker can:
- Enable user registration
- Set the default role to `administrator`
- Register a new account that will automatically gain **admin privileges**
---
## ๐งจ Vulnerability Details
- **CVE ID**: CVE-2025-2266
- **CVSS Score**: 9.8 (Critical)
- **Vector**: Missing Authorization
- **CVSS Vector String**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
- **Published**: March 28, 2025
- **Last Updated**: March 29, 2025
---
## โ๏ธ Exploit Script Overview
This Python script exploits the vulnerability to:
1. Enable registration + assign `administrator` as the default role
2. Register a new user of your choice
3. Provide login details and instructions for privilege access
---
## ๐งพ Requirements
- Python 3.x installed ๐
- `requests` module (install via `pip install requests`)
- WordPress site with the vulnerable plugin installed (`8.6.5` โ `8.7.5`)
---
## ๐ง How It Works
1. The script checks the plugin version via:
```
/wp-content/plugins/checkout-mestres-wp/readme.txt
```
2. If the plugin is vulnerable:
- It sends a POST request to the plugin's exposed AJAX function
- Modifies WordPress options without authentication
3. Registers a new user (default: `nxploited`) with administrator privileges
---
## ๐ ๏ธ Usage
```bash
python CVE-2025-2266.py -u http://target.com/wordpress -newuser adminx -email hacker@evil.com
```
### Optional Parameters:
| Option | Description |
|------------------|---------------------------------------------------------------|
| `-u`, `--url` | Target WordPress site URL (Required) |
| `-newuser` | Create new admin user (default username: `nxploited`) |
| `-email` | Email for new user (default: `nxploitbot@gmail.com`) |
---
## ๐ Full Help Message
```bash
usage: CVE-2025-2266.py [-h] -u URL [-newuser [NEWUSER]] [-email [EMAIL]]
CVE-2025-2266 Checkout Mestres do WP for WooCommerce Plugin Exploit
By : Nxploited | Khaled Alenazi
options:
-h, --help show this help message and exit
-u, --url URL Target WordPress site URL (e.g., http://example.com/wordpress)
-newuser [NEWUSER] Create new admin user (default username: nxploited)
-email [EMAIL] Email for new user (default: nxploitbot@gmail.com)
```
---
## ๐ After Exploitation
Once the user is created:
1. Visit the login page:
```
http://target.com/wordpress/wp-login.php
```
2. Click on **"Lost your password?"**
- Enter the email used (e.g., `nxploitbot@gmail.com`)
- WordPress will send a reset link
3. Set a password and gain full admin access ๐ฏ
---
## ๐จโ๐ป Author
**Exploit by Nxploited | Khaled Alenazi**
---
โ ๏ธ *This script is for educational and authorized testing purposes only.*