CVE-2020-24186

CRITICAL NUCLEI

gVectors wpDiscuz <7.0.4 - RCE

Title source: llm

Description

A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.

Exploits (9)

nomisec WORKING POC 19 stars
by hev0x · poc
https://github.com/hev0x/CVE-2020-24186-wpDiscuz-7.0.4-RCE
nomisec WORKING POC 13 stars
by substing · poc
https://github.com/substing/CVE-2020-24186_reverse_shell_upload
nomisec WORKING POC 3 stars
by Sakura-501 · poc
https://github.com/Sakura-501/CVE-2020-24186-exploit
nomisec WORKING POC
by GazettEl · poc
https://github.com/GazettEl/CVE-2020-24186
nomisec WORKING POC
by sec-dojo-com · poc
https://github.com/sec-dojo-com/CVE-2020-24186
nomisec WORKING POC
by meicookies · poc
https://github.com/meicookies/CVE-2020-24186
exploitdb WORKING POC
by UnD3sc0n0c1d0 · bashwebappsphp
https://www.exploit-db.com/exploits/49962
exploitdb WORKING POC
by Fellipe Oliveira · pythonwebappsphp
https://www.exploit-db.com/exploits/49967
metasploit WORKING POC EXCELLENT
by Chloe Chamberland, Hoa Nguyen - SunCSR · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload.rb

Nuclei Templates (1)

WordPress wpDiscuz <=7.0.4 - Remote Code Execution
CRITICALby Ganofins

Scores

CVSS v3 10.0
EPSS 0.9415
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Classification

CWE
CWE-434
Status published

Affected Products (1)

gvectors/wpdiscuz < 7.0.4

Timeline

Published Aug 24, 2020
Tracked Since Feb 18, 2026