nomisec
WORKING POC
19 stars
by m3ssap0 · remote
https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit
This repository contains a functional Python exploit for CVE-2024-10924, an authentication bypass vulnerability in Really Simple Security WordPress plugin versions < 9.1.2. The exploit sends a crafted POST request to bypass two-factor authentication and obtain a valid session cookie for any user ID.
Classification
Working Poc 95%
Target:
Really Simple Security WordPress plugin < 9.1.2
No auth needed
Prerequisites:
Two-Factor Authentication setting enabled in the plugin · Target WordPress site URL · Valid user ID (default: 1 for admin)
nomisec
WORKING POC
13 stars
by JoshuaProvoste · remote
https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
This repository contains a functional exploit for CVE-2024-10924, demonstrating a 0-click RCE vulnerability in WordPress sites. The exploit bypasses authentication and 2FA, uploads a malicious plugin, and establishes an interactive shell.
Classification
Working Poc 95%
Target:
WordPress (specific plugin not explicitly named, but likely related to Really Simple SSL)
No auth needed
Prerequisites:
Access to the target WordPress site · A malicious plugin ZIP file
nomisec
WRITEUP
8 stars
by m3ssap0 · remote
https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application
This repository provides a detailed technical analysis of CVE-2024-10924, an authentication bypass vulnerability in Really Simple Security < 9.1.2. It includes a vulnerable Docker environment for testing and a root cause analysis of the flawed `check_login_and_get_user()` function.
Classification
Writeup 100%
Target:
Really Simple Security < 9.1.2
No auth needed
Prerequisites:
Two-Factor Authentication enabled in Really Simple Security
nomisec
WORKING POC
4 stars
by Maalfer · remote
https://github.com/Maalfer/CVE-2024-10924-PoC
This PoC demonstrates an authentication bypass vulnerability in the Really Simple Security WordPress plugin by exploiting a flawed MFA implementation. It captures a Set-Cookie header via a crafted request to skip MFA onboarding and uses it to authenticate as an admin.
Classification
Working Poc 95%
Target:
Really Simple Security WordPress Plugin (version not specified)
Auth required
Prerequisites:
Valid WordPress credentials · Really Simple Security plugin with MFA enabled
nomisec
WORKING POC
4 stars
by RandomRobbieBF · remote
https://github.com/RandomRobbieBF/CVE-2024-10924
The repository contains a functional proof-of-concept for an authentication bypass vulnerability in Really Simple Security WordPress plugin versions 9.0.0 to 9.1.1.1. The exploit leverages improper user check error handling in the two-factor REST API actions, allowing unauthenticated attackers to log in as any existing user.
Classification
Working Poc 90%
Target:
Really Simple Security (Free, Pro, and Pro Multisite) WordPress plugin versions 9.0.0 to 9.1.1.1
No auth needed
Prerequisites:
Two-Factor Authentication setting enabled in the plugin
nomisec
WORKING POC
3 stars
by Trackflaw · poc
https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker
This repository provides a Dockerized WordPress environment with the vulnerable Really Simple SSL plugin (version 9.1.1.1) to demonstrate CVE-2024-10924, an authentication bypass flaw in the Two-Factor Authentication feature. The setup includes a pre-configured WordPress instance with the vulnerable plugin installed, allowing for testing of the exploit.
Classification
Working Poc 90%
Target:
Really Simple SSL plugin for WordPress (versions 9.0.0 to 9.1.1.1)
No auth needed
Prerequisites:
Docker and Docker Compose installed · Really Simple SSL plugin version 9.1.1.1 or earlier
nomisec
WORKING POC
3 stars
by D1se0 · remote
https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB
This repository contains a functional exploit for CVE-2024-10924, which bypasses MFA in WordPress by exploiting a vulnerability in the Really Simple SSL plugin's two-factor authentication endpoint. The exploit automates the process of obtaining a session cookie and logging into the WordPress admin panel.
Classification
Working Poc 95%
Target:
WordPress with Really Simple SSL plugin
Auth required
Prerequisites:
WordPress installation with Really Simple SSL plugin · Valid admin credentials · Network access to the target
nomisec
WORKING POC
2 stars
by h8sU · remote
https://github.com/h8sU/wordpress-cve-2024-10924-exploit
This repository contains a functional Python exploit for CVE-2024-10924, which bypasses two-factor authentication (2FA) in the Really Simple SSL WordPress plugin by sending a crafted request to the vulnerable REST API endpoint.
Classification
Working Poc 95%
Target:
Really Simple SSL WordPress plugin (vulnerable versions)
No auth needed
Prerequisites:
Target WordPress site using a vulnerable version of Really Simple SSL · Valid user ID
nomisec
WORKING POC
2 stars
by Nxploited · remote
https://github.com/Nxploited/CVE-2024-10924-Exploit
This repository contains a functional exploit for CVE-2024-10924, an authentication bypass vulnerability in the Really Simple Security WordPress plugin (versions 9.0.0 - 9.1.1.1). The exploit sends a crafted POST request to bypass 2FA and extracts session cookies to gain administrative access.
Classification
Working Poc 95%
Target:
Really Simple Security WordPress plugin (versions 9.0.0 - 9.1.1.1)
No auth needed
Prerequisites:
Target WordPress site with vulnerable Really Simple Security plugin · 2FA enabled on the target site
nomisec
WRITEUP
2 stars
by ademto · infoleak
https://github.com/ademto/wordpress-cve-2024-10924-pentest
This repository contains a detailed technical writeup of CVE-2024-10924, a critical 2FA bypass vulnerability in the Really Simple SSL WordPress plugin. It includes reconnaissance steps, vulnerability analysis, and exploitation methodology but does not provide functional exploit code.
Classification
Writeup 95%
Target:
Really Simple SSL WordPress plugin
No auth needed
Prerequisites:
WordPress site with Really Simple SSL plugin installed · REST API access
nomisec
WORKING POC
by MattJButler · remote
https://github.com/MattJButler/CVE-2024-10924
The repository contains a functional Python script that exploits CVE-2024-10924 by sending a crafted POST request to a WordPress endpoint to bypass authentication. The script targets the Really Simple SSL plugin's two-factor authentication onboarding process.
Classification
Working Poc 90%
Target:
Really Simple SSL WordPress plugin
No auth needed
Prerequisites:
WordPress site with Really Simple SSL plugin installed · Network access to the target
nomisec
WORKING POC
by Hunt3r850 · remote
https://github.com/Hunt3r850/CVE-2024-10924-PoC
This PoC demonstrates an authentication bypass in the Really Simple Security WordPress plugin (CVE-2024-10924) by exploiting a flawed MFA implementation. It sends a crafted request to skip MFA onboarding, captures a session cookie, and uses it to authenticate as an admin user.
Classification
Working Poc 95%
Target:
Really Simple Security WordPress Plugin (version not specified)
Auth required
Prerequisites:
Valid WordPress admin credentials · Really Simple Security plugin with MFA enabled
nomisec
WORKING POC
by Hunt3r850 · remote
https://github.com/Hunt3r850/CVE-2024-10924-Wordpress-Docker
This repository provides a Docker-based environment to demonstrate CVE-2024-10924, an authentication bypass vulnerability in the Really Simple Security WordPress plugin. It includes a pre-configured WordPress instance with the vulnerable plugin installed, allowing for testing of the exploit.
Classification
Working Poc 90%
Target:
Really Simple Security WordPress plugin versions 9.0.0 to 9.1.1.1
No auth needed
Prerequisites:
Docker installed · Basic knowledge of WordPress and Docker
nomisec
WORKING POC
by cy3erdr4g0n · remote
https://github.com/cy3erdr4g0n/CVE-2024-10924
The repository contains a functional Python script that exploits CVE-2024-10924, an authentication bypass vulnerability in the WordPress Really Simple Security plugin. The exploit sends a crafted POST request to bypass 2FA and retrieve session cookies for any user ID.
Classification
Working Poc 95%
Target:
Really Simple Security plugin for WordPress (versions 9.0.0 to 9.1.1.1)
No auth needed
Prerequisites:
Target WordPress site with vulnerable plugin version · User ID of the target account
nomisec
WORKING POC
by sariamubeen · remote
https://github.com/sariamubeen/CVE-2024-10924
The repository contains a functional Python exploit for CVE-2024-10924, which bypasses 2FA onboarding in the WordPress Really Simple SSL plugin by sending a crafted POST request to the vulnerable `/reallysimplessl/v1/two_fa/skip_onboarding` endpoint. The exploit retrieves authentication cookies that can be used to gain admin access.
Classification
Working Poc 95%
Target:
WordPress Really Simple SSL plugin (version not specified)
No auth needed
Prerequisites:
Target domain · User ID (e.g., admin ID)
github
WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/CVE-2024-10924.py
The repository contains a functional exploit for CVE-2024-10924, targeting a vulnerability in Really Simple SSL plugin for WordPress. The exploit bypasses two-factor authentication by sending a crafted POST request to skip onboarding, potentially allowing unauthorized access.
Classification
Working Poc 95%
Target:
Really Simple SSL WordPress plugin
No auth needed
Prerequisites:
Target URL · User ID
nomisec
WORKING POC
by sharafu-sblsec · poc
https://github.com/sharafu-sblsec/CVE-2024-10924
The repository contains a functional exploit for CVE-2024-10924, an authentication bypass vulnerability in the Really Simple SSL WordPress plugin. The exploit sends a crafted JSON payload to bypass two-factor authentication and retrieves session cookies for unauthorized access.
Classification
Working Poc 95%
Target:
Really Simple SSL WordPress plugin versions 9.0.0 to 9.1.1.1
No auth needed
Prerequisites:
Valid user ID · Target URL with vulnerable endpoint
nomisec
WORKING POC
by bodoinon · infoleak
https://github.com/bodoinon/CVE-2024-10924
This repository contains a functional exploit for CVE-2024-10924, an authentication bypass vulnerability in the Really Simple Security WordPress plugin. It includes a Dockerized vulnerable environment, a Python exploit script, and mitigation steps.
Classification
Working Poc 95%
Target:
Really Simple Security WordPress plugin (version not specified, but likely <= 6.7.0)
No auth needed
Prerequisites:
Docker · Python 3.x · WordPress instance with Really Simple Security plugin installed
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-10924-Exploit
The repository contains functional exploit code for CVE-2024-10924, targeting a WordPress plugin (3DPrint Lite 1.9.1.4) with an arbitrary file upload vulnerability. The Python script demonstrates the ability to upload a malicious file to a vulnerable target.
Classification
Working Poc 95%
Target:
WordPress Plugin 3DPrint Lite 1.9.1.4
No auth needed
Prerequisites:
target URL · malicious file to upload
nomisec
WORKING POC
by julesbsz · remote
https://github.com/julesbsz/CVE-2024-10924
The repository contains a functional exploit for CVE-2024-10924, an authentication bypass vulnerability in the Really Simple Plugins WordPress plugin (versions 9.0.0 to 9.1.1.1). The exploit leverages a flaw in the REST API's error handling to bypass Two-Factor Authentication (2FA) and take control of a user account.
Classification
Working Poc 95%
Target:
Really Simple Plugins WordPress plugin (versions 9.0.0 to 9.1.1.1)
No auth needed
Prerequisites:
WordPress site with Really Simple Plugins plugin (versions 9.0.0 to 9.1.1.1) · Two-Factor Authentication enabled
nomisec
WORKING POC
by MaleeshaUdan · remote
https://github.com/MaleeshaUdan/wordpress-CVE-2024-10924--exploit
The repository contains a functional Python exploit for CVE-2024-10924, an authentication bypass vulnerability in the WordPress Really Simple Security plugin. The exploit sends a crafted POST request to bypass authentication and retrieve session cookies for a specified user ID.
Classification
Working Poc 95%
Target:
WordPress Really Simple Security plugin (version not specified)
No auth needed
Prerequisites:
Target WordPress site with vulnerable Really Simple Security plugin · User ID of the target account
exploitdb
WORKING POC
by Antonio Francesco Sardella · pythonwebappsphp
https://www.exploit-db.com/exploits/52207
This Python script exploits an authentication bypass vulnerability in Really Simple Security (CVE-2024-10924) by sending a crafted POST request to the `/reallysimplessl/v1/two_fa/skip_onboarding` endpoint, allowing unauthenticated attackers to log in as any user when Two-Factor Authentication is enabled.
Classification
Working Poc 95%
Target:
Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1
No auth needed
Prerequisites:
Two-Factor Authentication must be enabled in the target WordPress installation
metasploit
WORKING POC
EXCELLENT
by Valentin Lobstein, István Márton · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_reallysimplessl_2fa_bypass_rce.rb
This Metasploit module exploits an authentication bypass vulnerability in the WordPress Really Simple SSL plugin (versions 9.0.0 to 9.1.1.1) to bypass 2FA and upload a malicious plugin for remote code execution (RCE). It requires 2FA to be enabled on the target site.
Classification
Working Poc 100%
Target:
WordPress Really Simple SSL Plugin (9.0.0 to 9.1.1.1)
No auth needed
Prerequisites:
2FA enabled on the target WordPress site · Valid user ID to target for 2FA bypass