Wordpress Elementor 3.11.6 Exploit - Full Takeover
by TheGoodlife - Sunday July 2, 2023 at 04:45 PM
#41
thank you TheGoodlife ....
Reply
#42
aint no one gonna spend 8 creds for that

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | https://breachforums.rs/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#43
wow let me see Big Grin
Reply
#44
good exploit to use.
Reply
#45
thanks for the share, loving it
Reply
#46
thanks for share
Reply
#47
thank you very much
Reply
#48
for some reason i get an error saying NoneType object has no atribute text?

(Apr 10, 2024, 01:47 PM)tripling Wrote: Not working.May be its patched.Its showing error 

line 26, in <module>
    wp_nonce = soup.find('script', {'id': 'elementor-common-js-before'}).text.split('"nonce":"')[1].split('"')[0]
AttributeError: 'NoneType' object has no attribute 'text'

same thing happened to me
Reply
#49
(Jul 02, 2023, 04:45 PM)TheGoodlife Wrote: Meh meh meh, not interested in keeping that private anymore.

Usage: Enter url (with http/https) in the website parameter. Enter a registered user (no permissions necessary, can be a woocommerce customer too) and pass in username and password.

Above the payload you will find a link on which settings you can override using this exploit.

Enjoy:

Thank for this.... got an idea
Reply
#50
Really great exploit to use
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  {SECRET} DATABASE OF EXPLOITS lulagain 436 26,535 1 hour ago
Last Post: nobcoderfck
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 108 13,688 1 hour ago
Last Post: nobcoderfck
  Ban Any Discord Exploit phineasfisherman 7 452 8 hours ago
Last Post: sniperx86
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 42 3,754 10 hours ago
Last Post: d39ug
  New Zer0 Day Wordpress A3g00n 81 3,384 Yesterday, 03:06 AM
Last Post: DirtyEra

Forum Jump:


 Users browsing this forum: 1 Guest(s)