Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-10924 PoC — Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass

Source
Associated Vulnerability
Title:Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass (CVE-2024-10924)
Description:The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
Readme
# CVE-2024-10924 Exploit - WordPress Really Simple SSL Plugin 2FA Bypass

## Overview
This repository contains an exploit for **CVE-2024-10924**, a vulnerability in the **Really Simple SSL** plugin for WordPress. It allows an attacker to bypass Two-Factor Authentication (2FA) onboarding and gain unauthorized administrative access to a WordPress site.

## Vulnerability Details
- **CVE**: CVE-2024-10924
- **Affected Component**: `/reallysimplessl/v1/two_fa/skip_onboarding` endpoint
- **Impact**: Authentication Bypass (Admin Access)
- **Requirements**: User ID (e.g., `1` for the default admin) and the vulnerable domain.

## Exploit Requirements
- Python 3.x
- `requests` library

## Installation
```bash
pip install requests
```

## Usage
```bash
python3 exploit.py <domain> <user_id>
```
Example:
```bash
python3 exploit.py example.com 1
```

## Expected Output
The exploit will print the `wordpress_logged_in_*` and `wordpress_*` cookies, which can be manually set in your browser to authenticate as the targeted user.

## Manual Cookie Injection (Firefox Example)
1. Open Developer Tools (`F12` or Right-click > Inspect).
2. Go to the **Storage** tab > **Cookies** > `http://<domain>`
3. Add the cookies retrieved from the exploit:
    - `wordpress_logged_in_*`
    - `wordpress_*`
4. Navigate to `http://<domain>/wp-admin` to access the admin panel.

## License
This exploit is intended for educational and authorized testing purposes only.

## Disclaimer
Use this code responsibly. Unauthorized access to systems is illegal.

File Snapshot

[4.0K] /data/pocs/5bc2d6981577e0cf35fea145f8cdaa0e72063ca7 ├── [1.2K] exploit.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →