Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Really Simple Plugins | Really Simple Security Pro multisite | 9.0.0 ~ 9.1.1.1 | - | |
| rogierlankhorst | Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) | 9.0.0 ~ 9.1.1.1 | - | |
| Really Simple Plugins | Really Simple Security Pro | 9.0.0 ~ 9.1.1.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass | https://github.com/RandomRobbieBF/CVE-2024-10924 | POC Details |
| 2 | CVE-2024-10924 Authentication Bypass Using an Alternate Path or Channel (CWE-288) | https://github.com/FoKiiin/CVE-2024-10924 | POC Details |
| 3 | WARNING: This is a vulnerable application to test the exploit for the Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). Run it at your own risk! | https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-vulnerable-application | POC Details |
| 4 | Simple Python script | https://github.com/MattJButler/CVE-2024-10924 | POC Details |
| 5 | Exploits Really Simple Security < 9.1.2 authentication bypass (CVE-2024-10924). | https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit | POC Details |
| 6 | None | https://github.com/julesbsz/CVE-2024-10924 | POC Details |
| 7 | Exploit for CVE-2024-10924 -> Really Simple Security < 9.1.2 authentication bypass | https://github.com/dua1337/Exploit-for-CVE-2024-10924 | POC Details |
| 8 | Bypass del MFA en WordPress con el plugin Really Simple Security instalado entre las versiones 9.0.0 – 9.1.1.1. | https://github.com/Maalfer/CVE-2024-10924-PoC | POC Details |
| 9 | None | https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB | POC Details |
| 10 | None | https://github.com/Hunt3r850/CVE-2024-10924-PoC | POC Details |
| 11 | None | https://github.com/Hunt3r850/CVE-2024-10924-Wordpress-Docker | POC Details |
| 12 | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass | https://github.com/Nxploited/CVE-2024-10924-Exploit | POC Details |
| 13 | None | https://github.com/cy3erdr4g0n/CVE-2024-10924 | POC Details |
| 14 | A Proof-of-Concept (PoC) exploit for CVE-2024-10924, a vulnerability in the Really Simple SSL WordPress plugin that allows bypassing two-factor authentication (2FA). Includes mitigation techniques to secure affected WordPress sites. | https://github.com/h8sU/wordpress-cve-2024-10924-exploit | POC Details |
| 15 | None | https://github.com/sariamubeen/CVE-2024-10924 | POC Details |
| 16 | WordPress CVE-2024-10924 Exploit for Really Simple Security plugin | https://github.com/MaleeshaUdan/wordpress-CVE-2024-10924--exploit | POC Details |
| 17 | CVE-2024-10924 - Authentication Bypass in ReallySimpleSSL Wordpress Plugin | https://github.com/sharafu-sblsec/CVE-2024-10924 | POC Details |
| 18 | None | https://github.com/OliveiraaX/-CVE-2024-10924 | POC Details |
| 19 | The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default). | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-10924.yaml | POC Details |
| 20 | None | https://github.com/ademto/wordpress-cve-2024-10924-pentest | POC Details |
| 21 | None | https://github.com/bodoinon/CVE-2024-10924 | POC Details |
| 22 | Unauthenticated authentication bypass to RCE exploit for CVE-2024-10924. Abuses an authentication and 2FA bypass in the Really Simple Security WordPress plugin to impersonate an admin user, upload a malicious plugin, and achieve remote command execution via an interactive shell. | https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet