CVE-2024-5630 WordPress RCE via zip bypass upload
by HA_twck - Wednesday July 17, 2024 at 09:43 AM
#41
thanks for sharing mate
Reply
#42
I will try this vulnerability!

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#43
Great Vulnerabilities. Pwn wordpress sites.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#44
thank you brother
Reply
#45
Lemme try this oh yeah
Reply
#46
nice one bro, will test
Reply
#47
Thank you for the information provided. I want to check what it is.
Reply
#48
thanks for sharing bro
Reply
#49
(Jul 17, 2024, 09:43 AM)HA_twck Wrote: The latest to come under the spotlight is the “Insert or Embed Articulate Content into WordPress” plugin, which is now flagged for a critical Remote Code Execution (RCE) vulnerability. This security loophole, tracked under CVE-2024-5630, jeopardizes websites by allowing arbitrary code execution through seemingly benign ZIP file uploads.

CVE:CVE-2024-5630
Plugin: Insert or Embed Articulate Content into WordPress < 4.3000000024
Critical:Very High

POC:



PS: I dont own source; only sharing for those who need.

Hello ajsdhabsdasdasdasdasd
Reply
#50
thanks for sharing this man
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Ban Any Discord Exploit phineasfisherman 7 444 6 hours ago
Last Post: sniperx86
  [POC] Google OAuth "MultiLogin" endpoint 0-day Farfallaiero 107 13,643 7 hours ago
Last Post: d39ug
  Dokan Pro Unauthenticated SQL Injection POC | CVSS 10 Loki 42 3,746 7 hours ago
Last Post: d39ug
  {SECRET} DATABASE OF EXPLOITS lulagain 435 26,462 Yesterday, 06:11 AM
Last Post: DirtyEra
  New Zer0 Day Wordpress A3g00n 81 3,381 Yesterday, 03:06 AM
Last Post: DirtyEra

Forum Jump:


 Users browsing this forum: 1 Guest(s)