WordPress Vulnerable Plugin for Security Researchers / Hunters
In the ever-evolving landscape of cybersecurity, the role of security researchers is paramount. Their task involves uncovering vulnerabilities in various software systems to ensure robustness and resilience against potential threats. WordPress, being one of the most popular content management systems globally, often becomes a target for malicious actors. To aid security researchers in their endeavors, a custom WordPress plugin has been developed specifically for testing purposes.
The custom WordPress plugin, available on GitHub, serves as a tool for security researchers to simulate and identify potential vulnerabilities within WordPress installations.
Created with the intention of being vulnerable, the plugin mimics common security flaw found in real-world scenarios.
Utilization and Installation
- Installation: Security researchers can install the vulnerable WordPress plugin on their local or test using localWP WordPress instances to begin the assessment process.
- Exploration: By interacting with the plugin's functionalities, researchers can identify potential remote code execution vulnerability, such as input fields susceptible to injection attacks or file upload mechanisms lacking proper validation.
https://gist.github.com/Splint3r7/176051864d6a39ff3b331b606a32ffe5
Vulnerable Machine dr34d:
I got you covered if you wanna play with the code but looking for a pre build machine. I created a vulnerable machine based on real world exploitation that utilities the the vulnerable WordPress plugin code with other vulnerabilities too. The goal of the vulnerable machine is to perform enumeration identify vulnerable applications/services, perform enumeration and of course get user and root level access on the box.
Repository: https://github.com/Splint3r7/Vulnhub-Dr34d-Writeup
Machine link: https://drive.google.com/file/d/1z9hok_x4HOpWEtSjokyYPzyL4GDgznj0/view
Official Write-Up: https://github.com/Splint3r7/Vulnhub-Dr34d-Writeup/blob/main/Vulnhub Dr34d WriteUp-3.pdf