.. / CVE-2022-1609

Exploit for The School Management < 9.9.7 - Remote Code Execution (CVE-2022-1609)

Description:

The School Management plugin before version 9.9.7 contains an obfuscated backdoor injected in it’s license checking code that registers a REST API handler, allowing an unauthenticated attacker to execute arbitrary PHP code on the site.

Nuclei Template

View the template here CVE-2022-1609.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-1609.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2022-1609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1609
https://github.com/nastar-id/WP-school-management-RCE
https://github.com/0x007f/cve-2022-1609-exploit
https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2
https://github.com/nomi-sec/PoC-in-GitHub