Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6624 PoC — WordPress plugin JSON API User安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin JSON API User安全漏洞 (CVE-2024-6624)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin JSON API User 3.9.3版本及之前版本存在安全漏洞,该漏洞源于对自定义用户元字段的控制不当。
Description
This is a Python script that exploits the CVE-2024-6624 vulnerability in the JSON API User <= 3.9.3 plugin for WordPress. 
Readme
# **CVE-2024-6624 | JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation**

![CVE-2024-6624 Jenderal92](https://github.com/user-attachments/assets/4d8b4be0-cd0f-4f4e-a4af-e2c80c9c25c4)


This is a Python script that exploits the **CVE-2024-6624** vulnerability in the **JSON API User <= 3.9.3** plugin for WordPress. This tool allows unauthenticated attackers to register new users and escalate their privileges to administrator without authorization.

---

## **How to Use**

### **Preparation**

1. Ensure that Python 2.7 is installed on your system.  
2. Install the `requests` dependency:

   ```bash
   pip install requests
   ```

3. Prepare a text file (`urls.txt`) containing a list of target URLs (one URL per line).

---

### **Usage Steps**

1. Run the script:

   ```bash
   python CVE-2024-6624.py
   ```

2. Enter the filename containing the target URLs when prompted:

   ```bash
   Enter the filename containing the URL list: urls.txt
   ```

3. The script will process each URL in the list and attempt to exploit the vulnerability.

4. Successful exploit results will be saved in the `admin.txt` file in the following format:

   ```
   http://example.com/wp-login.php|ngocoxscrew|ngocoxs_crews+
   ```

---


## **Disclaimer**
I have written the disclaimer on the cover of Jenderal92. You can check it [HERE !!!](https://github.com/Jenderal92/)
File Snapshot

[4.0K] /data/pocs/dc4006dfbb2d8e151bd8b508c4a87aa110a4d9d4 ├── [4.8K] CVE-2024-6624.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.