Full title: Wordpress MU 0day Remote Code Execution Exploit Category: remote exploits Platform: multiple Remote PHP and Shell code execution on any version of Wordpress MU. See dork: "powered by wordpress mu". 0day exploit never been released. This exploit will re-write the file wp-config.php and add a shell to it eval($_GET['****HIDDEN****']); you can replace this to anything you want in the exploit code just make sure to encode correctly just like in the exploit settings. # 0day.today @ http://0day.today/