CVE-2024-5630 WordPress RCE via zip bypass upload
by HA_twck - Wednesday July 17, 2024 at 09:43 AM
#21
Thanks mannnnnn
Reply
#22
Thanks for sharing :cateat:
Reply
#23
very nice thanks
Reply
#24
thanks for your sharing mate
Reply
#25
thanks for sharing man !
Reply
#26
A very interesting exploit

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Buying/selling real IDs/documents is prohibited
Reply
#27
thank you for sharing brother
Reply
#28
thank you! Smile Smile Smile

thank you! Smile Smile Smile
Reply
#29
thanks for sharing

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#30
(Jul 17, 2024, 09:43 AM)HA_twck Wrote: The latest to come under the spotlight is the “Insert or Embed Articulate Content into WordPress” plugin, which is now flagged for a critical Remote Code Execution (RCE) vulnerability. This security loophole, tracked under CVE-2024-5630, jeopardizes websites by allowing arbitrary code execution through seemingly benign ZIP file uploads.

CVE:CVE-2024-5630
Plugin: Insert or Embed Articulate Content into WordPress < 4.3000000024
Critical:Very High

POC:



PS: I dont own source; only sharing for those who need.

Thanks for sharing!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  POC CVE-2025-24071 caca28sapo1 17 1,271 Yesterday, 02:12 PM
Last Post: Test689
  New Zer0 Day Wordpress A3g00n 83 4,286 May 11, 2026, 08:17 PM
Last Post: j4ng0
  {SECRET} DATABASE OF EXPLOITS lulagain 441 28,242 May 11, 2026, 05:41 PM
Last Post: chiki
  Google Dorks for finding SQL injection vulnerabilities and other security issues 1yush 69 3,814 May 11, 2026, 03:55 PM
Last Post: fkmonkey
  CVE-2024-32002 RCE PoC HA_twck 2 595 May 11, 2026, 01:33 PM
Last Post: newxiao1

Forum Jump:


 Users browsing this forum: 1 Guest(s)