Skip to content

t101804/WP-PrivescExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WP-PrivescExploit

Mass check & exploit Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation

Info

The plugin does not validate the password reset key, which could allow unauthenticated attackers to reset arbitrary account's password to anything they want, by knowing the related email or username, gaining access to them For more info about exploit & tools join in https://t.me/DailyToolz

Python Setup

pip install -r requirements.txt

Usage For Scanner

Input thread and ur lists

python scan.py 

Usage

CVE-2023-32243
Title : Mass Exploit & Checker Elementor privesc 0day
Exploit type : privilege-escalation
Affected : 1 million +
usage: main.py [-h] -l LISTS [-t THREAD] -p PASSWORD [-usr USERNAME]
main.py: error: the following arguments are required: -l/--lists, -p/--password

Example

python3 exploit.py --l listweb.txt  --password "adminmemek" -t 10 

You can also use without threading ( more accurate )

python3 exploit.py --l listweb.txt  --password "adminmemek"

About

just an ordinary exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages