This plugin is intended solely for educational and research purposes. It demonstrates how vulnerable or misconfigured WordPress installations can be exploited through plugin uploads. Do not use this on systems you do not own or have explicit permission to test.
This project provides a minimal, proof-of-concept WordPress plugin that, once installed and activated, can generate a reverse shell back to a listener of your choice. It is meant to support ethical hacking students learning about web exploitation and privilege escalation within CMS environments.
The plugin follows valid WordPress structures to avoid rejection during installation, and executes shell commands based on incoming parameters.
- β Valid WordPress plugin structure
- π― Easy to deploy and activate
- π Reverse shell execution via attacker-controlled listener
- βοΈ Lightweight and minimal footprint
Before uploading the plugin, start your listener using Netcat or any preferred tool:
nc -lvnp 4444Replace the IP and port in webshell-plugin.php with your listener's details.
Compress the plugin folder and upload it to WordPress via:
Plugins > Add New > Upload Plugin
Then activate the plugin.
- β Only use this in lab or test environments.
- π§Ή Remove the plugin immediately after testing.
- π Never upload this to a live or production server.
This repository is part of an ethical hacking curriculum. Use it only in permitted CTFs or learning labs.
This project is released under the MIT License. Use responsibly.