- Author: Joshua Provoste
- https://x.com/JoshuaProvoste/status/1858586463777989073
This repository contains a proof-of-concept exploit for CVE-2023-51409, an unauthenticated arbitrary file upload vulnerability in the AI Engine: ChatGPT Chatbot WordPress plugin, leading to remote command execution (RCE).
The script uploads a PHP payload through a vulnerable REST endpoint without authentication, deploys it into the WordPress uploads directory, detects the target operating system, and provides an interactive remote shell for command execution.
python CVE-2023-51409.py --target http://target-wordpress-site
Once executed, the script automatically uploads the payload, validates accessibility, detects the OS, and drops into an interactive shell.
- No authentication required (pre-auth / 0-click).
- Works against vulnerable plugin versions only.
- Intended for security research and controlled environments.