CVE-2024-50498
CRITICAL EXPLOITED NUCLEILubus WP Query Console < 1.0 - Code Injection
Title source: ruleDescription
Improper Control of Generation of Code ('Code Injection') vulnerability in LUBUS WP Query Console allows Code Injection.This issue affects WP Query Console: from n/a through 1.0.
Exploits (7)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WP_QueryConsole(CVE-2024-50498).py
nomisec
WORKING POC
3 stars
by RandomRobbieBF · remote
https://github.com/RandomRobbieBF/CVE-2024-50498
nomisec
WORKING POC
1 stars
by JoshuaProvoste · remote
https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498
nomisec
WORKING POC
by androidteacher · remote
https://github.com/androidteacher/CVE-2024-50498-wpquery
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-50498
Nuclei Templates (1)
WP Query Console <= 1.0 - Remote Code Execution
CRITICALVERIFIEDby s4e-io
FOFA:
body="wp-content/plugins/wp-query-console/"
Scores
CVSS v3
10.0
EPSS
0.9031
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-06-08
Classification
CWE
CWE-94
Status
published
Affected Products (1)
lubus/wp_query_console
< 1.0
Timeline
Published
Oct 28, 2024
Tracked Since
Feb 18, 2026