CVE-2020-24186
CRITICAL NUCLEIgVectors wpDiscuz <7.0.4 - RCE
Title source: llmDescription
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
Exploits (9)
exploitdb
WORKING POC
by Fellipe Oliveira · pythonwebappsphp
https://www.exploit-db.com/exploits/49967
nomisec
WORKING POC
19 stars
by hev0x · poc
https://github.com/hev0x/CVE-2020-24186-wpDiscuz-7.0.4-RCE
nomisec
WORKING POC
13 stars
by substing · poc
https://github.com/substing/CVE-2020-24186_reverse_shell_upload
nomisec
WORKING POC
3 stars
by Sakura-501 · poc
https://github.com/Sakura-501/CVE-2020-24186-exploit
metasploit
WORKING POC
EXCELLENT
by Chloe Chamberland, Hoa Nguyen - SunCSR · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload.rb
Nuclei Templates (1)
WordPress wpDiscuz <=7.0.4 - Remote Code Execution
CRITICALby Ganofins
References (4)
Scores
CVSS v3
10.0
EPSS
0.9421
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
gvectors/wpdiscuz
7.0 - 7.0.4
Published
Aug 24, 2020
Tracked Since
Feb 18, 2026