Skip to content

Latest commit

 

History

History
41 lines (28 loc) · 885 Bytes

README.md

File metadata and controls

41 lines (28 loc) · 885 Bytes

CVE-2023-32243.

Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation ( MASS VERSION FASTED ) + Auto User Finder

Info

The plugin does not validate the password reset key, which could allow unauthenticated attackers to reset arbitrary account's password to anything they want, by knowing the related email or username, gaining access to them

Python Setup

pip install -r requirements.txt

Exploit Details

https://patchstack.com/articles/critical-privilege-escalation-in-essential-addons-for-elementor-plugin-affecting-1-million-sites/

Usage

usage: exploit.py -l [list] -p [Password] -t [Thread]

options:
  -l list     list of the WordPress site
  -p PASSWORD
                        Password to set for the selected username
  -t Threads

Example

python3 exploit.py -l list.txt -p M@rAzAli -t 300