Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-10924 PoC — Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass

Source
Associated Vulnerability
Title:Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass (CVE-2024-10924)
Description:The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
Description
WordPress CVE-2024-10924 Exploit for  Really Simple Security plugin
Readme
# 🚀 WordPress Really Simple Security Plugin Vulnerability (CVE-2024-10924)

## 📌 Overview
WordPress is one of the most popular open-source Content Management Systems (CMS), powering millions of websites worldwide—from personal blogs to full-fledged e-commerce platforms. However, in **November 2024**, a critical security vulnerability was discovered in the **Really Simple Security plugin**, a widely used security tool trusted by millions.

This vulnerability, identified as **CVE-2024-10924**, enabled attackers to bypass authentication and gain unauthorized access to user accounts—including those with **administrative privileges**. In some cases, this could even allow privilege escalation, potentially granting attackers complete control over the **server and network**.

## 🔥 About the Vulnerability
- **Plugin Affected:** Really Simple Security
- **CVE ID:** CVE-2024-10924
- **Severity Level:** 🔴 Critical
- **Discovery Date:** November 2024
- **Discovered By:** István Márton (Wordfence)
- **Impact:** Authentication Bypass → Admin Account Takeover → Potential Full Server Control

## 🛡️ Why It’s Dangerous
Attackers exploiting this flaw could:
✅ Log in as an admin without proper credentials
✅ Modify or delete website content
✅ Inject malicious scripts
✅ Install backdoors for persistent access
✅ Escalate privileges to control the **entire server**

## 🔍 Technical Insights
The vulnerability stems from **flawed authentication mechanisms** within the plugin, allowing attackers to **bypass login security checks**. Once an attacker gains administrative access, they can exploit other WordPress or server vulnerabilities to escalate privileges and gain full control.

## 🔄 Mitigation & Fixes
If you're using the **Really Simple Security plugin**, take immediate action:

1. **Update Immediately** 🚀 – Ensure you’re running the latest patched version.
2. **Disable the Plugin (If Necessary)** – Until an official fix is available, consider disabling the plugin.
3. **Enable Two-Factor Authentication (2FA)** 🔐 – Adds an extra layer of security to user accounts.
4. **Monitor User Activity** 📊 – Check for unauthorized logins and suspicious actions.
5. **Check Server Logs** 🔎 – Identify any potential exploitation attempts.
6. **Backup Your Website** 🛑 – Always keep secure backups in case of compromise.

## 📢 Conclusion
This vulnerability serves as a stark reminder that **no security plugin is foolproof**. Always keep your plugins updated, follow best security practices, and stay informed about **emerging threats**. If you manage a WordPress site, securing your admin panel should be a top priority! 🔒

---
👨‍💻 **Discovered by:** István Márton (Wordfence)  
📜 **CVE ID:** [CVE-2024-10924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10924)  
📅 **Reported in:** November 2024  
📢 **Stay Secure, Stay Updated!**

File Snapshot

[4.0K] /data/pocs/c0e715cd0ac11be736649b6890d60d7160e03f40 ├── [1.2K] Exploit.py └── [2.9K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →