CVE-2024-5630 WordPress RCE via zip bypass upload
by HA_twck - Wednesday July 17, 2024 at 09:43 AM
#21
Thanks mannnnnn
Reply
#22
Thanks for sharing :cateat:
Reply
#23
very nice thanks
Reply
#24
thanks for your sharing mate
Reply
#25
thanks for sharing man !
Reply
#26
A very interesting exploit

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Buying/selling real IDs/documents is prohibited
Reply
#27
thank you for sharing brother
Reply
#28
thank you! Smile Smile Smile

thank you! Smile Smile Smile
Reply
#29
thanks for sharing

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#30
(Jul 17, 2024, 09:43 AM)HA_twck Wrote: The latest to come under the spotlight is the “Insert or Embed Articulate Content into WordPress” plugin, which is now flagged for a critical Remote Code Execution (RCE) vulnerability. This security loophole, tracked under CVE-2024-5630, jeopardizes websites by allowing arbitrary code execution through seemingly benign ZIP file uploads.

CVE:CVE-2024-5630
Plugin: Insert or Embed Articulate Content into WordPress < 4.3000000024
Critical:Very High

POC:



PS: I dont own source; only sharing for those who need.

Thanks for sharing!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  {SECRET} DATABASE OF EXPLOITS lulagain 438 26,775 1 hour ago
Last Post: NUKEx
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 108 13,818 Yesterday, 05:42 PM
Last Post: nobcoderfck
  Ban Any Discord Exploit phineasfisherman 7 474 Yesterday, 10:16 AM
Last Post: sniperx86
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 42 3,785 Yesterday, 08:39 AM
Last Post: d39ug
  New Zer0 Day Wordpress A3g00n 81 3,416 May 05, 2026, 03:06 AM
Last Post: DirtyEra

Forum Jump:


 Users browsing this forum: 1 Guest(s)