The Backup Migration plugin for WordPress (versions ≤1.3.7) is vulnerable to Remote Code Execution (RCE) due to improper handling in /includes/backup-heart.php. Attackers can manipulate an include statement to execute arbitrary code on the target server.
⚠️ Use only for authorized security testing!
🛠 Setup
1️⃣ Install Dependencies
Ensure Python 3.x is installed, then install required libraries:
pip install -r requirements.txt
2️⃣ Run the Exploit
Test a single target: python exploit.py -u <base_url>
Example: python exploit.py -u
Scan multiple URLs from a file: python exploit.py -f urls.txt -t 10 -o results.txt
-f → Load targets from urls.txt
-t → Use 10 threads for faster scanning
-o → Save vulnerable URLs to results.txt
🐚 Interactive Shell (On Successful Exploit)
If successful, the exploit drops a PHP shell on the target. You can then:
Run system commands like a normal shell
Exit with exit
Clear output with clear
⚠️ Use only for authorized security testing!
🛠 Setup
1️⃣ Install Dependencies
Ensure Python 3.x is installed, then install required libraries:
pip install -r requirements.txt
2️⃣ Run the Exploit
Test a single target: python exploit.py -u <base_url>
Example: python exploit.py -u
Scan multiple URLs from a file: python exploit.py -f urls.txt -t 10 -o results.txt
-f → Load targets from urls.txt
-t → Use 10 threads for faster scanning
-o → Save vulnerable URLs to results.txt
🐚 Interactive Shell (On Successful Exploit)
If successful, the exploit drops a PHP shell on the target. You can then:
Run system commands like a normal shell
Exit with exit
Clear output with clear