Skip to content

david-prv/vulnerable-wordpress-plugins

Repository files navigation

CVWP Logo

Collection of Vulnerable WordPress Plugins (CVWP)

This repository is a source for vulnerable wordpress plugins. It can be used for evaluating security testing techniques in the realm of websec, and it's especially intended for fuzzer evaluations.

Installation

In this section, you will learn how to setup a vulnerable WordPress 6.7.1 instance. Please don't expose this to the internet! The website will contain several critial vulnerabilities! You are responsible for your own actions.

Preparation

Please install WP-CLI on your machine. You can find detailed installation instructions here. The advanced usage is well-documented on developer.wordpress.org.

Step 1: Download WordPress Core

wp core download --path=/var/www/html --version=6.7.1 --locale=en_US

Step 2: Setup Configuration

wp config create \
    --dbname=your_db_name \
    --dbuser=your_db_user \
    --prompt=dbpass

Step 3: Create Database

wp db create

Step 4: Install WordPress

wp core install \
    --url=wordpress.local \
    --title="Vulnerable WordPress" \
    --admin_user=admin \
    --admin_password=admin \
    --admin_email=webmaster@wordpress.local

Step 5: Install CVWP

git clone https://github.com/david-prv/vulnerable-wordpress-plugins -b main /var/www/html/wp-content/plugins

Step 6: Run Installer

python3 install_dependencies.py --yes /var/www/html/wp-content/plugins

Step 7: Activate Plugins

wp plugin activate --all

That's it, you're done!

List of Plugins

List is sorted by their number of active installations.

woocommerce (6.2.0)

  • CVE: CVE-2022-0775 (Improper Authorization)
  • CVSS: 5.4 (Medium)
  • Publicly Published: February 22, 2022
  • Last Updated: February 6, 2024
  • Researcher: Krzysztof Zając - CERT PL
  • Active Installations: 8,000,000

litespeed-cache (6.2.0.1)

essential-addons-for-elementor-lite (5.8.15)

  • CVE: CVE-2024-5612 (XSS)
  • CVSS: 6.4 (Medium)
  • Publicly Published: June 6, 2024
  • Last Updated: June 7, 2024
  • Researcher: wesley (wcraft)
  • Active Installations: 2,000,000

all-in-one-wp-security-and-firewall (5.1.0)

complianz-gdpr (6.5.6)

iwp-client (1.9.4.4)

give (3.16.1)

  • CVE: CVE-2024-8353 (Object Injection)
  • CVSS: 10.0 (Critical)
  • Publicly Published: September 27, 2024
  • Last Updated: September 28, 2024
  • Researcher: cuokon
  • Active Installations: 100,000

iubenda-cookie-law-solution (3.3.2)

  • CVE: CVE-2022-3911 (Missing Authorization)
  • CVSS: 8.8 (High)
  • Publicly Published: December 12, 2022
  • Last Updated: February 2, 2023
  • Researcher: Krzysztof Zając - CERT PL
  • Active Installations: 100,000

wp-clone-by-wp-academy (2.4.6)

  • CVE: CVE-2024-10913 (Object Injection)
  • CVSS: 8.8 (High)
  • Publicly Published: November 19, 2024
  • Last Updated: November 20, 2024
  • Researcher: Webbernaut
  • Active Installations: 70,000

social-warfare (3.5.2)

  • CVE: CVE-2019-9978 (XSS)
  • CVSS: 7.2 (High)
  • Publicly Published: March 21, 2019
  • Last Updated: January 22, 2024
  • Researcher: Andrew Wilder
  • Active Installations: 20,000

bookingpress-appointment-booking (1.1.7)

  • CVE: CVE-2024-7350 (Authentication Bypass)
  • CVSS: 9.8 (Critical)
  • Publicly Published: August 7, 2024
  • Last Updated: August 8, 2024
  • Researcher: Gibran Abdillah
  • Active Installations: 20,000

extensions-for-cf7 (3.0.6)

  • CVE: CVE-2024-29102 (XSS)
  • CVSS: 7.2 (High)
  • Publicly Published: March 15, 2024
  • Last Updated: March 20, 2024
  • Researcher: RE-ALTER
  • Active Installations: 6,000

About

A Collection of Vulnerable WordPress Plugins

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors