Path: blob/master/modules/misc/wordpress/upload_rce_plugin/config.yaml
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5beef:6module:7wordpress_upload_rce_plugin:8enable: true9category: Misc10name: WordPress Upload RCE Plugin11description: |12This module attempts to upload and activate a malicious wordpress plugin, which will be hidden from the plugins list in the dashboard.13Afterwards, the URI to trigger is: http://vulnerable-wordpress.site/wp-content/plugins/beefbind/beefbind.php,14and the command to execute can be send by a POST-parameter named 'cmd', with a 'BEEF' header containing the value of the auth_key option.15However, there are more stealthy ways to send the POST request to execute the command, depending on the target.16CORS headers have been added to allow bidirectional crossorigin communication.17authors: ['Bart Leppens', 'Erwan LR']18target:19working: ['ALL']202122