Skip to content

JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-51793 / 0-Click RCE Exploit

CVE-2024-51793

This repository contains a proof-of-concept exploit for CVE-2024-51793, an unauthenticated arbitrary file upload vulnerability in a vulnerable WordPress plugin, leading to remote command execution (RCE).

What the script does

The script abuses a vulnerable admin-ajax.php action to upload a PHP payload without authentication. Once uploaded, it detects the target operating system and provides an interactive remote shell for command execution.

Usage

python CVE-2024-51793.py --target http://target-wordpress-site

After execution, the script uploads the payload, extracts the uploaded file URL from the server response, detects the OS, and drops into an interactive shell.

Notes

  • No authentication required (pre-auth / 0-click).
  • Works only against vulnerable installations.

About

Unauthenticated 0-click RCE exploit for CVE-2024-51793. Exploits an arbitrary file upload vulnerability via admin-ajax.php to upload a PHP payload and achieve remote command execution on vulnerable WordPress installations, including OS detection and an interactive command shell.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages