CVE-2024-5630 WordPress RCE via zip bypass upload
by HA_twck - Wednesday July 17, 2024 at 09:43 AM
#21
Thanks mannnnnn
Reply
#22
Thanks for sharing :cateat:
Reply
#23
very nice thanks
Reply
#24
thanks for your sharing mate
Reply
#25
thanks for sharing man !
Reply
#26
A very interesting exploit

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Buying/selling real IDs/documents is prohibited
Reply
#27
thank you for sharing brother
Reply
#28
thank you! Smile Smile Smile

thank you! Smile Smile Smile
Reply
#29
thanks for sharing

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#30
(Jul 17, 2024, 09:43 AM)HA_twck Wrote: The latest to come under the spotlight is the “Insert or Embed Articulate Content into WordPress” plugin, which is now flagged for a critical Remote Code Execution (RCE) vulnerability. This security loophole, tracked under CVE-2024-5630, jeopardizes websites by allowing arbitrary code execution through seemingly benign ZIP file uploads.

CVE:CVE-2024-5630
Plugin: Insert or Embed Articulate Content into WordPress < 4.3000000024
Critical:Very High

POC:



PS: I dont own source; only sharing for those who need.

Thanks for sharing!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Google Dorks for finding SQL injection vulnerabilities and other security issues 1yush 65 2,850 1 hour ago
Last Post: UnknownUser01
  Acunetix Premium Cracked v24 Full Activated A3g00n 22 1,304 9 hours ago
Last Post: Usercomplex
  CVE-2024-32002 RCE PoC HA_twck 1 376 Apr 24, 2026, 05:13 AM
Last Post: p2wnz_bontensec
  GeoServer: Full Exploit + Mass Scanning Utility Loki 26 2,791 Apr 24, 2026, 04:56 AM
Last Post: p2wnz_bontensec
  New Zer0 Day Wordpress A3g00n 78 2,840 Apr 24, 2026, 04:54 AM
Last Post: p2wnz_bontensec

Forum Jump:


 Users browsing this forum: 1 Guest(s)