## https://sploitus.com/exploit?id=18A6D802-FFD0-568A-896B-241B93935204
# CVE-2025-2011 - Depicter Plugin SQL Injection Vulnerability
**CVE Reference:** [CVE-2025-2011](https://www.tenable.com/cve/CVE-2025-2011)
This repository contains a proof-of-concept environment for testing the SQL injection vulnerability in Depicter Slider & Popup Builder plugin (versions < 3.6.2).
## Prerequisites
- Docker
- Docker Compose
- Python 3.x
- Required Python packages: `requests`, `colorama`
## Setup Instructions
1. **Start the Environment**
```bash
docker-compose up -d
```
2. **Complete WordPress Installation**
- Open your browser and navigate to `http://localhost:5555`
- Follow the WordPress installation wizard:
- Select your language
- Set up your site title
- Create an admin account
- Complete the installation
3. **Install the Vulnerable Plugin**
```bash
chmod +x install-plugin.sh
./install-plugin.sh
```
This script will:
- Install WP-CLI in the container
- Download and install Depicter plugin v3.6.1
- Activate the plugin
4. **Install Python Dependencies**
```bash
pip install requests colorama
```
## Testing the Vulnerability
The PoC script (`poc.py`) can be used to test the vulnerability in different modes:
1. **Check if target is vulnerable**
```bash
python poc.py -u http://localhost:5555
```
2. **Extract admin details**
```bash
python poc.py -u http://localhost:5555 -m admin
```
3. **Execute custom SQL query**
```bash
python poc.py -u http://localhost:5555 -m custom -q "SELECT VERSION()"
```
4. **Enable debug output**
```bash
python poc.py -u http://localhost:5555 -d
```
## Environment Details
- WordPress: Latest version
- Depicter Plugin: v3.6.1 (vulnerable version)
- MySQL: 5.7
- PHP: Latest version (from WordPress image)
## Cleanup
To stop and remove the environment:
```bash
docker-compose down -v
```
## Disclaimer
This environment is provided for educational and testing purposes only. Do not use this against any systems without explicit permission.