Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
75🚨 High Severity Bug in Search-Replace-DB (SRDB) - Full Exploit Insight
STAFF TEAM
#1
In 2020, a critical bug was discovered in the widely-used WordPress tool Search-Replace-DB (SRDB) — specifically in version 3.x — by GOD OF SERVER. This tool, developed by Interconnect IT, is designed to help developers perform safe, serialized string replacement in WordPress databases.
But when left exposed (as many do), it becomes a high-risk backdoor capable of full site manipulation — including replacing admin email addresses, WordPress titles, and even username credentials.
Affected Paths
  • Code:
    /Search-Replace-DB-master/
  • Code:
    /SRDB/
  • Code:
    /srdb/
  • Code:
    /search/
    (commonly renamed for obfuscation)
    Impact & ExploitIf publicly accessible, SRDB can be used to:
  • Change the WordPress site title (
    Code:
    wp_options -> blogname
    )
  • Replace admin email addresses (
    Code:
    wp_options -> admin_email
    )
  • No authentication is needed if the script is unprotected — which many deployments are.
  • Modify user credentials, including
    Code:
    user_login
    and
    Code:
    user_email
    (
    Code:
    wp_users
    )
  • Break or hijack plugin settings
  • Inject phishing or spam payloads into serialized arrays
     
    Exploit Example (Manual)Target:

    Code:
    https://target.com/SRDB/
    Replace Admin Email
  • Find table:
    Code:
    wp_options
  • Replace:
    • Search for:
      Code:
      admin@target.com
    • Replace with:
      Code:
      yourmail@exploit.com
  • Replace Username
  • Table:
    Code:
    wp_users
  • Search:
    Code:
    admin
  • Replace:
    Code:
    hacked
  •  
  • Click Live Run, then Submit
intitle:"Search Replace DB" inurl:"/Search-Replace-DB-master/" | inurl:"/srdb/" | inurl:"/search/" | inurl:"/SRDB/" "replace" "search for"

Reply to this thread