CVE-2020-24186
CRITICAL NUCLEIgVectors wpDiscuz <7.0.4 - RCE
Title source: llmDescription
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
Exploits (9)
nomisec
WORKING POC
19 stars
by hev0x · poc
https://github.com/hev0x/CVE-2020-24186-wpDiscuz-7.0.4-RCE
nomisec
WORKING POC
13 stars
by substing · poc
https://github.com/substing/CVE-2020-24186_reverse_shell_upload
nomisec
WORKING POC
3 stars
by Sakura-501 · poc
https://github.com/Sakura-501/CVE-2020-24186-exploit
exploitdb
WORKING POC
by Fellipe Oliveira · pythonwebappsphp
https://www.exploit-db.com/exploits/49967
metasploit
WORKING POC
EXCELLENT
by Chloe Chamberland, Hoa Nguyen - SunCSR · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload.rb
Nuclei Templates (1)
WordPress wpDiscuz <=7.0.4 - Remote Code Execution
CRITICALby Ganofins
References (4)
Scores
CVSS v3
10.0
EPSS
0.9415
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Classification
CWE
CWE-434
Status
published
Affected Products (1)
gvectors/wpdiscuz
< 7.0.4
Timeline
Published
Aug 24, 2020
Tracked Since
Feb 18, 2026