A step-by-step guide to exploiting the Openfire's last vulnerability ( CVE-2023-32315 ):
1. Search & Check:
Go to and use the search query: app="Openfire"
Sort by countries if you want
then open them and check this link
if you got logs then it is vulnerable and if you are redirected to login page then it is not.
2. Exploit:
Download Go environment and install it:
Clone or download this repo:
then run these commands inside the download/cloned repo folder:
go mod tidy
go run main.go -u
Then wait, if it succeeds it will generate an admin login and password (open it in incognito to avoid cache problems)
After login, download this webshell and upload it as a plugin in the admin panel you just logged in:
3. More:
My google dork is: intitle:"Openfire Admin Console" inurl:9090
After uploading the shell you will find it in the panel: Server > Server Settings > shell plugin (down left) > pass is 123
1. Search & Check:
Go to and use the search query: app="Openfire"
Sort by countries if you want
then open them and check this link
if you got logs then it is vulnerable and if you are redirected to login page then it is not.
2. Exploit:
Download Go environment and install it:
Clone or download this repo:
then run these commands inside the download/cloned repo folder:
go mod tidy
go run main.go -u
Then wait, if it succeeds it will generate an admin login and password (open it in incognito to avoid cache problems)
After login, download this webshell and upload it as a plugin in the admin panel you just logged in:
3. More:
My google dork is: intitle:"Openfire Admin Console" inurl:9090
After uploading the shell you will find it in the panel: Server > Server Settings > shell plugin (down left) > pass is 123