Skip to content

Mass Exploit Privileges Authentication (Subscriber to Administrator) - Wordpress Plugin ReviewX

Notifications You must be signed in to change notification settings

Alucard0x1/CVE-2023-2833

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2023-2833 Mass Exploit Generator by Alucard0x1

This repository contains an exploit for CVE-2023-2833, a privilege escalation vulnerability in the ReviewX plugin for WordPress versions up to and including 1.6.13.

Description

The ReviewX plugin is vulnerable to privilege escalation, allowing a subscriber-level user to escalate their privileges to administrator-level.

Usage

  1. Create a subscriber account on the target website using the following credentials:

    • Username must be named set to = tt
    • Password must be set to = tt
  2. Clone this repository and navigate to the exploit directory.

  3. Prepare a url.txt file that contains a list of target website URLs, with one URL per line (main domain).

  4. Run the exploit script by executing the following command:

Alucard0x1MassExploit.exe url.txt

Credits

  • Exploit Credit & Author: Lana Codes (Lana Codes)
  • Exploit Generator by : Alucard0x1
  • CVE Information: CVE-2023-2833

Disclaimer

This exploit is provided for educational purposes only. Use it at your own risk. The author and OpenAI do not take responsibility for any illegal activities conducted with this exploit.

About

Mass Exploit Privileges Authentication (Subscriber to Administrator) - Wordpress Plugin ReviewX

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published