Path: blob/master/modules/misc/wordpress_post_auth_rce/config.yaml
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5beef:6module:7wordpress_post_auth_rce:8enable: true9category: "Misc"10name: "Wordpress Post-Auth RCE"11description: "This module attempts to upload and activate a malicious wordpress plugin. Afterwards, the URI to trigger it is: http://vulnerable-wordpress.site/wordpress/wp-content/plugins/beefbind/beefbind.php. The command to execute can be send by a POST-parameter named 'cmd'. CORS headers have been added to allow bidirectional crossorigin communication."12authors: ["Bart Leppens"]13target:14working: ["ALL"]151617