Add WP Depicter Plugin Unauth SQL Injection (CVE-2025-2011) #20185
+292
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hello Metasploit Team,
This PR implements a new auxiliary scanner module
scanner/http/wp_depicter_sqli_cve_2025_2011
for CVE-2025-2011, an UNAUTHENTICATED SQL injection in the Slider & Popup Builder by Depicter plugin (≤ 3.6.1).The module automates:
admin-ajax.php?s=
user_login:user_pass
) from the inferred*_users
tablewordpress.users
), and reportingVerification
msfconsole
use auxiliary/scanner/http/wp_depicter_sqli_cve_2025_2011
set RHOSTS <target_ip>
set RPORT <http_port>
set TARGETURI /
set COUNT 1
exploit_market
)wp_users
)wordpress.users