exploitdb
WORKING POC
by Barak Tawily · pythondosphp
https://www.exploit-db.com/exploits/43968
This script performs a DoS attack against WordPress by sending a large number of HTTP requests to the vulnerable `load-scripts.php` endpoint, exploiting CVE-2018-6389. It uses multiple threads and random user agents to bypass basic mitigations.
Classification
Working Poc 95%
Target:
WordPress <= 4.9.2
No auth needed
Prerequisites:
Target WordPress instance with vulnerable `load-scripts.php` endpoint
nomisec
WORKING POC
127 stars
by s0md3v · poc
https://github.com/s0md3v/Shiva
This is a functional DoS exploit for CVE-2018-6389 targeting WordPress sites by abusing load-scripts.php to load excessive jQuery scripts. It uses multithreading and proxy rotation to amplify the attack.
Classification
Working Poc 95%
Target:
WordPress (versions affected by CVE-2018-6389)
No auth needed
Prerequisites:
Target must be a WordPress site · Python environment with 'requests' and 'proxify' libraries
nomisec
WORKING POC
81 stars
by safebuffer · poc
https://github.com/safebuffer/CVE-2018-6389
This is a Python-based DoS exploit targeting WordPress versions < 4.9.3 via the load-scripts.php endpoint. It floods the target with HTTP requests using randomized user agents and threading to amplify the attack.
Classification
Working Poc 95%
Target:
WordPress (versions < 4.9.3)
No auth needed
Prerequisites:
Target URL running vulnerable WordPress version
nomisec
WRITEUP
13 stars
by ItinerisLtd · poc
https://github.com/ItinerisLtd/trellis-cve-2018-6389
This repository provides mitigation guidance and Ansible roles for CVE-2018-6389, a DoS vulnerability in WordPress affecting load-scripts.php and load-styles.php. It includes Nginx rules and WordPress configuration changes to block or disable concatenation of JS/CSS files.
Classification
Writeup 100%
Target:
WordPress (versions with concatenation enabled)
No auth needed
Prerequisites:
Access to WordPress admin or server configuration · Trellis or similar Ansible-based deployment
nomisec
WORKING POC
10 stars
by knqyf263 · poc
https://github.com/knqyf263/CVE-2018-6389
This repository provides a proof-of-concept for CVE-2018-6389, a WordPress DoS vulnerability. It includes instructions to set up a vulnerable WordPress instance and execute a DoS attack using a Python script (doser.py).
Classification
Working Poc 90%
Target:
WordPress 4.9.3
No auth needed
Prerequisites:
Docker to run the vulnerable WordPress instance · Python to execute the doser.py script
nomisec
WORKING POC
6 stars
by omidsec · poc
https://github.com/omidsec/CVE-2018-6389
This PoC exploits CVE-2018-6389, a DoS vulnerability in WordPress due to improper handling of the 'load' parameter in load-scripts.php, allowing resource exhaustion via excessive script loading. The script automates the attack by sending multiple requests with increasing payload sizes to measure server response.
Classification
Working Poc 95%
Target:
WordPress (versions prior to 4.9.4)
No auth needed
Prerequisites:
Access to the target WordPress site's /wp-admin/load-scripts.php endpoint
nomisec
WORKING POC
3 stars
by ianxtianxt · poc
https://github.com/ianxtianxt/CVE-2018-6389
This repository contains a Python-based DoS tool that floods a target with HTTP GET or POST requests using multiple threads. It is designed to exploit CVE-2018-6389, a vulnerability in the Linux kernel's handling of TCP connections.
Classification
Working Poc 90%
Target:
Linux kernel (versions affected by CVE-2018-6389)
No auth needed
Prerequisites:
Target IP/URL · Network connectivity to the target
nomisec
WORKING POC
3 stars
by Zazzzles · poc
https://github.com/Zazzzles/Wordpress-DOS
This PoC exploits CVE-2018-6389, a DoS vulnerability in WordPress via the `/wp-admin/load-scripts.php` endpoint by sending multiple requests with a large payload of scripts. It uses threading to amplify the attack.
Classification
Working Poc 95%
Target:
WordPress (unpatched versions)
No auth needed
Prerequisites:
Target WordPress site with unpatched `/wp-admin/load-scripts.php` endpoint
nomisec
SCANNER
2 stars
by m3ssap0 · poc
https://github.com/m3ssap0/wordpress_cve-2018-6389
This repository contains a Java-based scanner for CVE-2018-6389, a WordPress DoS vulnerability. It checks for the presence of the vulnerability by sending a single HTTP GET request with a crafted payload but does not perform an actual DoS attack.
Classification
Scanner 90%
Target:
WordPress through 4.9.2
No auth needed
Prerequisites:
Target URL pointing to a WordPress installation
nomisec
WORKING POC
2 stars
by JavierOlmedo · poc
https://github.com/JavierOlmedo/wordpress-cve-2018-6389
This is a functional DoS exploit targeting WordPress <= 4.9.4 via the 'load-scripts.php' endpoint. It floods the target with HTTP requests using randomized user agents and referrers to exhaust server resources.
Classification
Working Poc 95%
Target:
WordPress <= 4.9.4
No auth needed
Prerequisites:
Target WordPress site with vulnerable 'load-scripts.php' endpoint
nomisec
WORKING POC
2 stars
by dsfau · poc
https://github.com/dsfau/wordpress-CVE-2018-6389
This is a Metasploit module designed to exploit CVE-2018-6389, a DoS vulnerability in WordPress's load-scripts.php. It sends multiple HTTP requests with a large list of plugins to trigger resource exhaustion.
Classification
Working Poc 95%
Target:
WordPress (versions affected by CVE-2018-6389)
No auth needed
Prerequisites:
Access to the WordPress wp-admin/load-scripts.php endpoint
nomisec
WORKING POC
1 stars
by vineetkia · poc
https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389
This repository contains a Python script and shell script to exploit CVE-2018-6389, a DoS vulnerability in WordPress 4.9.x via the load-scripts.php file. The script sends multiple requests with a large number of JavaScript files to overload the server.
Classification
Working Poc 95%
Target:
WordPress 4.9.x
No auth needed
Prerequisites:
Target WordPress site with vulnerable load-scripts.php
nomisec
WORKING POC
1 stars
by armaanpathan12345 · poc
https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389
This is a Python-based proof-of-concept exploit for CVE-2018-6389, a WordPress DoS vulnerability. It floods the target's load-scripts.php endpoint with multiple concurrent requests to exhaust server resources.
Classification
Working Poc 90%
Target:
WordPress (versions affected by CVE-2018-6389)
No auth needed
Prerequisites:
Target WordPress instance · Network access to the target
nomisec
WORKING POC
1 stars
by JulienGadanho · poc
https://github.com/JulienGadanho/cve-2018-6389-php-patcher
This repository provides a PHP script to patch WordPress installations against CVE-2018-6389, a DoS vulnerability. The script modifies core WordPress files to mitigate the issue by disabling script concatenation and ensuring proper file inclusion.
Classification
Working Poc 95%
Target:
WordPress (versions affected by CVE-2018-6389)
No auth needed
Prerequisites:
Access to WordPress root directory · Write permissions for core WordPress files
nomisec
WRITEUP
1 stars
by yolabingo · poc
https://github.com/yolabingo/wordpress-fix-cve-2018-6389
This repository provides an Apache RewriteRule to mitigate a potential DoS attack via WordPress wp-admin/load-scripts.php. It references the initial disclosure by Barak Tawily but does not contain exploit code.
Classification
Writeup 90%
Target:
WordPress (unspecified version)
No auth needed
Prerequisites:
Access to Apache configuration · WordPress installation with vulnerable load-scripts.php
nomisec
WORKING POC
by amit-pathak009 · poc
https://github.com/amit-pathak009/CVE-2018-6389-FIX
This script is a patch for CVE-2018-6389, a WordPress vulnerability. It locates WordPress installations on a server and applies security patches to mitigate the vulnerability by modifying key files.
Classification
Working Poc 90%
Target:
WordPress
Auth required
Prerequisites:
Access to the server · WordPress installations present
nomisec
WORKING POC
by alessiogilardi · poc
https://github.com/alessiogilardi/PoC---CVE-2018-6389
This repository contains a Python-based DoS tool targeting CVE-2018-6389 in WordPress 4.9.2. The script sends multiple HTTP GET requests to exploit a vulnerability in the load-scripts.php endpoint, causing resource exhaustion.
Classification
Working Poc 95%
Target:
WordPress 4.9.2
No auth needed
Prerequisites:
Target URL with vulnerable WordPress installation
nomisec
WORKING POC
by fakedob · poc
https://github.com/fakedob/tvsz
This repository contains a Node.js-based PoC for CVE-2018-6389, a WordPress DoS vulnerability. The script exploits the load-scripts.php endpoint to perform resource exhaustion attacks by requesting multiple uncached JavaScript files, leading to high server load.
Classification
Working Poc 90%
Target:
WordPress (unspecified version)
No auth needed
Prerequisites:
NodeJS 8.11.2 · Access to vulnerable WordPress instance · Proxy list for anonymization
nomisec
STUB
by mudhappy · poc
https://github.com/mudhappy/Wordpress-Hack-CVE-2018-6389
The repository contains standard WordPress files without any exploit code or proof-of-concept for CVE-2018-6389. No offensive techniques or vulnerability demonstrations are present.
Target:
WordPress
No auth needed
nomisec
WRITEUP
by BlackRouter · poc
https://github.com/BlackRouter/cve-2018-6389
The repository contains only a README.md file with social media links and no exploit code or technical details. It references CVE-2018-6389 but provides no functional PoC.
Classification
Writeup 30%
Target:
unknown
No auth needed
nomisec
WORKING POC
by thechrono13 · poc
https://github.com/thechrono13/PoC---CVE-2018-6389
This repository contains a Python-based DoS tool designed to exploit CVE-2018-6389 in WordPress 4.9.2 by sending a high volume of HTTP GET requests to the vulnerable endpoint. The script uses multiple threads and randomized headers to bypass basic mitigations.
Classification
Working Poc 90%
Target:
WordPress 4.9.2
No auth needed
Prerequisites:
Target URL with vulnerable WordPress instance · Network connectivity to the target
nomisec
WORKING POC
by Jetserver · poc
https://github.com/Jetserver/CVE-2018-6389-FIX
This script is a patch for CVE-2018-6389, a WordPress vulnerability. It locates WordPress installations on a server and applies mitigations by modifying core files to prevent exploitation.
Classification
Working Poc 95%
Target:
WordPress (versions affected by CVE-2018-6389)
Auth required
Prerequisites:
server access · WordPress installations present
nomisec
WRITEUP
by rastating · poc
https://github.com/rastating/modsecurity-cve-2018-6389
This repository provides a ModSecurity ruleset for detecting attacks exploiting CVE-2018-6389, a vulnerability in WordPress. It does not contain exploit code but offers defensive rules.
Classification
Writeup 90%
Target:
WordPress (CVE-2018-6389)
No auth needed
Prerequisites:
ModSecurity installed