.. / CVE-2023-6634

Exploit for LearnPress < 4.2.5.8 - Remote Code Execution (CVE-2023-6634)

Description:

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

Nuclei Template

View the template here CVE-2023-6634.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-6634.yaml
Copy

References:

https://wpscan.com/vulnerability/909580f4-1306-4e61-ac7d-e7a2eb0961f8/
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/learnpress/learnpress-4257-command-injection
https://plugins.trac.wordpress.org/changeset/3013957/learnpress
https://nvd.nist.gov/vuln/detail/CVE-2023-6634
https://www.wordfence.com/threat-intel/vulnerabilities/id/21291ed7-cdc0-4698-9ec4-8417160845ed?source=cve