Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6386 PoC — WPML Multilingual CMS <= 4.6.12 - Authenticated (Contributor+) Remote Code Execution via Twig Server-Side Template Injec

Source
Associated Vulnerability
Title:WPML Multilingual CMS <= 4.6.12 - Authenticated (Contributor+) Remote Code Execution via Twig Server-Side Template Injection (CVE-2024-6386)
Description:The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Description
CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12.  RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx
Readme
 
<h1 align="left">CVE-2024-6386 - Remote Code Execution in WPML Plugin -   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h1>

 
 <a href="https://t.me/bl4ckhatx" target="_blank">
    <img src="https://raw.githubusercontent.com/maurodesouza/profile-readme-generator/master/src/assets/icons/social/telegram/default.svg" width="52" height="40" alt="telegram logo"  />
  </a>
<h3 align="left">CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12.  RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx
</h3>

 
<div align="center">
  <img src="poc.png"  />
</div>
 <a href="https://t.me/bl4ckhatx" target="_blank">
    <img src="https://raw.githubusercontent.com/maurodesouza/profile-readme-generator/master/src/assets/icons/social/telegram/default.svg" width="52" height="40" alt="telegram logo"  />
  </a>
 
<h2 align="left">🎯 CVE-2024-6386: WPML RCE Exploit -   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h2>

###

<p align="left">Zero-day RCE in WPML. All versions ≤ 4.6.12. Leverage a Twig SSTI flaw to own the server. Quick, brutal, and undetectable.</p>

###

<h2 align="left">Overview - CVE-2024-6386 -   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h2>

###

<p align="left">This repository contains a zero-day exploit for CVE-2024-6386, targeting the WPML (WordPress Multilingual Plugin). The exploit leverages a Server-Side Template Injection vulnerability in the Twig engine, present in all WPML versions up to and including 4.6.12. With minimal effort, attackers can execute arbitrary code on the server, making it a powerful tool for anyone looking to gain unauthorized access.</p>

###

<h3 align="left">For more details or to secure a customized exploit kit, reach out on Telegram:   <a href="https://t.me/bl4ckhatx" target="_blank">
    @bl4ckhatx
  </a></h3>

###

<div align="left">
  <a href="https://t.me/bl4ckhatx" target="_blank">
    <img src="https://raw.githubusercontent.com/maurodesouza/profile-readme-generator/master/src/assets/icons/social/telegram/default.svg" width="52" height="40" alt="telegram logo"  />
  </a>
</div>

###
File Snapshot

[4.0K] /data/pocs/ce21c33ffead96ec22f46ea01e0ea562ed7d1acf ├── [ 18K] poc.png └── [2.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →