Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-49328 PoC — WordPress plugin WP REST API FNS 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin WP REST API FNS 安全漏洞 (CVE-2024-49328)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WP REST API FNS 1.0.0版本及之前版本存在安全漏洞,该漏洞源于使用备用路径或通道漏洞绕过身份验证。
Readme
# CVE-2024-49328-exploit

## 🌟 Overview
This script exploits a privilege escalation vulnerability in the WP REST API FNS Plugin for WordPress. The vulnerability affects all versions up to and including `1.0.0`, allowing unauthenticated attackers to gain administrator privileges.


## ⚙️ Usage
```bash
python script.py -u <site_url> -e <email> -p <password>
```
 ### 🔍 Details of Exploitation


| **Step** | **Description**                                               | **Icon**           |
|----------|---------------------------------------------------------------|--------------------|
| Step 1   | Verify the version of the plugin.            | 📝                 |
| Step 2   | Check if the version is exploitable (`1.0.0`,  or lower).| ✅                 |
| Step 3   | Exploit the vulnerability and register a new admin user.      | 🔒             |
| Step 4   | Print the result with user credentials for verification.      | 🎉                 |

## ➡️ Example Output
```

Found Stable tag version: 1.0.0
Version 1.0.0 is exploitable.
Exploiting the site... Please wait.
Successfully
Username: Nxploit@admin.sa
Password: nxploit
```


### Install the required packages

```
pip install requests
```



## ⚠️ Disclaimer
🚨 Warning:

This script is for educational purposes only. Unauthorized use of this script against systems without explicit permission is illegal and unethical.
File Snapshot

[4.0K] /data/pocs/b41f38b5eb14fe74192eb0b561a12e44e8d3c06e ├── [5.2K] CVE-2024-49328.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.