Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-56071 PoC — WordPress Simple Dashboard plugin <= 2.0 - Privilege Escalation vulnerability

Source
Associated Vulnerability
Title:WordPress Simple Dashboard plugin <= 2.0 - Privilege Escalation vulnerability (CVE-2024-56071)
Description:Incorrect Privilege Assignment vulnerability in mikeleembruggen Simple Dashboard simple-dashboard allows Privilege Escalation.This issue affects Simple Dashboard: from n/a through <= 2.0.
Description
Simple Dashboard <= 2.0 - Unauthenticated Privilege Escalation
Readme
# 🚨 Simple Dashboard <= 2.0 - Unauthenticated Privilege Escalation

## 📄 Description
The Simple Dashboard plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.0.  
This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.

- **CVE:** CVE-2024-56071  
- **CVSS:** 9.8 (Critical)

---

## 🛠️ Exploitation Logic

Although the vulnerability is due to a missing capability check (no `current_user_can()`), WordPress core **protects `/wp-admin/` from unauthenticated access**.

➡️ This means the vulnerability is **only exploitable after login**, but the **user does not need any special privileges**.  
Even a **Subscriber** can exploit this vulnerability and change sensitive WordPress options.

After exploiting by uploading a JSON file containing:
```json
{ "default_role": "administrator" }
```
Any new user who registers will automatically receive **Administrator** role.

---

## ⚙️ Usage

```bash
usage: CVE-2024-56071.py [-h] -u URL -U USERNAME -P PASSWORD

Exploit for Simple Dashboard <= 2.0 - Privilege Escalation # By Khaled Alenazi

options:
  -h, --help              show this help message and exit
  -u, --url URL           Target WordPress base URL (e.g., http://target.com/wordpress)
  -U, --username USERNAME WordPress username to log in
  -P, --password PASSWORD Password for the WordPress user
```

---

By: Nxploited | Khaled Alenazi
File Snapshot

[4.0K] /data/pocs/e066e03b88715a9965d19585b5e0df6647622efe ├── [2.3K] CVE-2024-56071.py ├── [1.1K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →