CVE-2024-10924

CRITICAL EXPLOITED NUCLEI

WordPress Really Simple SSL Plugin Authentication Bypass to RCE

Title source: metasploit

Description

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

Exploits (24)

nomisec WORKING POC 19 stars
by m3ssap0 · remote
https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit
nomisec WORKING POC 13 stars
by JoshuaProvoste · remote
https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
nomisec WRITEUP 8 stars
by m3ssap0 · remote
https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application
nomisec WORKING POC 4 stars
by Maalfer · remote
https://github.com/Maalfer/CVE-2024-10924-PoC
nomisec WORKING POC 4 stars
by RandomRobbieBF · remote
https://github.com/RandomRobbieBF/CVE-2024-10924
nomisec WORKING POC 3 stars
by Trackflaw · poc
https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker
nomisec WORKING POC 3 stars
by D1se0 · remote
https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB
nomisec WORKING POC 2 stars
by h8sU · remote
https://github.com/h8sU/wordpress-cve-2024-10924-exploit
nomisec WORKING POC 2 stars
by Nxploited · remote
https://github.com/Nxploited/CVE-2024-10924-Exploit
nomisec WRITEUP 2 stars
by ademto · infoleak
https://github.com/ademto/wordpress-cve-2024-10924-pentest
nomisec NO CODE
by OliveiraaX · remote
https://github.com/OliveiraaX/-CVE-2024-10924
nomisec WORKING POC
by MattJButler · remote
https://github.com/MattJButler/CVE-2024-10924
nomisec WORKING POC
by Hunt3r850 · remote
https://github.com/Hunt3r850/CVE-2024-10924-PoC
nomisec WORKING POC
by Hunt3r850 · remote
https://github.com/Hunt3r850/CVE-2024-10924-Wordpress-Docker
nomisec WORKING POC
by cy3erdr4g0n · remote
https://github.com/cy3erdr4g0n/CVE-2024-10924
nomisec WORKING POC
by sariamubeen · remote
https://github.com/sariamubeen/CVE-2024-10924
github WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/CVE-2024-10924.py
nomisec WORKING POC
by sharafu-sblsec · poc
https://github.com/sharafu-sblsec/CVE-2024-10924
nomisec WORKING POC
by bodoinon · infoleak
https://github.com/bodoinon/CVE-2024-10924
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-10924-Exploit
nomisec WORKING POC
by julesbsz · remote
https://github.com/julesbsz/CVE-2024-10924
nomisec WORKING POC
by MaleeshaUdan · remote
https://github.com/MaleeshaUdan/wordpress-CVE-2024-10924--exploit
exploitdb WORKING POC
by Antonio Francesco Sardella · pythonwebappsphp
https://www.exploit-db.com/exploits/52207
metasploit WORKING POC EXCELLENT
by Valentin Lobstein, István Márton · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_reallysimplessl_2fa_bypass_rce.rb

Nuclei Templates (1)

Really Simple Security < 9.1.2 - Authentication Bypass
CRITICALVERIFIEDby yaser_s
Shodan: html:"/wp-content/plugins/really-simple-ssl"
FOFA: body="/wp-content/plugins/really-simple-ssl"

Scores

CVSS v3 9.8
EPSS 0.9391
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-11-14

Classification

CWE
CWE-306 CWE-288
Status published

Affected Products (3)

really-simple-plugins/really_simple_security < 9.1.2
really-simple-plugins/really_simple_security < 9.1.2
really-simple-plugins/really_simple_security < 9.1.2

Timeline

Published Nov 15, 2024
Tracked Since Feb 18, 2026