Files
beef/modules/misc/wordpress/upload_rce_plugin/config.yaml
2025-12-26 19:18:05 +10:00

21 lines
1.1 KiB
YAML

#
# Copyright (c) 2006-2026 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - https://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
wordpress_upload_rce_plugin:
enable: true
category: Misc
name: WordPress Upload RCE Plugin
description: |
This module attempts to upload and activate a malicious wordpress plugin, which will be hidden from the plugins list in the dashboard.
Afterwards, the URI to trigger is: http://vulnerable-wordpress.site/wp-content/plugins/beefbind/beefbind.php,
and the command to execute can be send by a POST-parameter named 'cmd', with a 'BEEF' header containing the value of the auth_key option.
However, there are more stealthy ways to send the POST request to execute the command, depending on the target.
CORS headers have been added to allow bidirectional crossorigin communication.
authors: ['Bart Leppens', 'Erwan LR']
target:
working: ['ALL']