Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-56071 PoC — WordPress plugin Simple Dashboard 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin Simple Dashboard 安全漏洞 (CVE-2024-56071)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Simple Dashboard 2.0版本及之前版本存在安全漏洞,该漏洞源于包含一个权限分配错误漏洞。
Description
Simple Dashboard <= 2.0 - Unauthenticated Privilege Escalation
Readme
# 🚨 Simple Dashboard <= 2.0 - Unauthenticated Privilege Escalation

## 📄 Description
The Simple Dashboard plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.0.  
This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.

- **CVE:** CVE-2024-56071  
- **CVSS:** 9.8 (Critical)

---

## 🛠️ Exploitation Logic

Although the vulnerability is due to a missing capability check (no `current_user_can()`), WordPress core **protects `/wp-admin/` from unauthenticated access**.

➡️ This means the vulnerability is **only exploitable after login**, but the **user does not need any special privileges**.  
Even a **Subscriber** can exploit this vulnerability and change sensitive WordPress options.

After exploiting by uploading a JSON file containing:
```json
{ "default_role": "administrator" }
```
Any new user who registers will automatically receive **Administrator** role.

---

## ⚙️ Usage

```bash
usage: CVE-2024-56071.py [-h] -u URL -U USERNAME -P PASSWORD

Exploit for Simple Dashboard <= 2.0 - Privilege Escalation # By Khaled Alenazi

options:
  -h, --help              show this help message and exit
  -u, --url URL           Target WordPress base URL (e.g., http://target.com/wordpress)
  -U, --username USERNAME WordPress username to log in
  -P, --password PASSWORD Password for the WordPress user
```

---

By: Nxploited | Khaled Alenazi
File Snapshot

[4.0K] /data/pocs/e066e03b88715a9965d19585b5e0df6647622efe ├── [2.3K] CVE-2024-56071.py ├── [1.1K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.