Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6386 PoC — WordPress plugin WPML 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin WPML 安全漏洞 (CVE-2024-6386)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin WPML 4.6.12及之前版本存在安全漏洞,该漏洞源于存在通过Twig服务器端模板注入进行远程代码执行的漏洞,因为渲染函数缺少输入验证和清理,使得经过身份验证的攻击者能够在服务器上执行代码。
Description
CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12.  RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx
Readme
 
<h1 align="left">CVE-2024-6386 - Remote Code Execution in WPML Plugin -   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h1>

 
 <a href="https://t.me/bl4ckhatx" target="_blank">
    <img src="https://raw.githubusercontent.com/maurodesouza/profile-readme-generator/master/src/assets/icons/social/telegram/default.svg" width="52" height="40" alt="telegram logo"  />
  </a>
<h3 align="left">CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12.  RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx
</h3>

 
<div align="center">
  <img src="poc.png"  />
</div>
 <a href="https://t.me/bl4ckhatx" target="_blank">
    <img src="https://raw.githubusercontent.com/maurodesouza/profile-readme-generator/master/src/assets/icons/social/telegram/default.svg" width="52" height="40" alt="telegram logo"  />
  </a>
 
<h2 align="left">🎯 CVE-2024-6386: WPML RCE Exploit -   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h2>

###

<p align="left">Zero-day RCE in WPML. All versions ≤ 4.6.12. Leverage a Twig SSTI flaw to own the server. Quick, brutal, and undetectable.</p>

###

<h2 align="left">Overview - CVE-2024-6386 -   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h2>

###

<p align="left">This repository contains a zero-day exploit for CVE-2024-6386, targeting the WPML (WordPress Multilingual Plugin). The exploit leverages a Server-Side Template Injection vulnerability in the Twig engine, present in all WPML versions up to and including 4.6.12. With minimal effort, attackers can execute arbitrary code on the server, making it a powerful tool for anyone looking to gain unauthorized access.</p>

###

<h3 align="left">For more details or to secure a customized exploit kit, reach out on Telegram:   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h3>

###

<div align="left">
  <a href="https://t.me/bl4ckhatx" target="_blank">
    <img src="https://raw.githubusercontent.com/maurodesouza/profile-readme-generator/master/src/assets/icons/social/telegram/default.svg" width="52" height="40" alt="telegram logo"  />
  </a>
</div>

###
File Snapshot

[4.0K] /data/pocs/ce21c33ffead96ec22f46ea01e0ea562ed7d1acf ├── [ 18K] poc.png └── [2.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.