- Author: Joshua Provoste
- https://x.com/JoshuaProvoste/status/1858910306140893268
This repository contains a proof-of-concept exploit for CVE-2024-51791, an unauthenticated arbitrary file upload vulnerability in a vulnerable WordPress forms plugin, leading to remote command execution (RCE).
The script uploads a PHP payload through a vulnerable form endpoint without authentication. It then enumerates upload directories to locate the payload, detects the target operating system, and provides an interactive remote shell for command execution.
python CVE-2024-51791.py --target http://target-wordpress-site/form-1/ --form-id 375
After execution, the script uploads the payload, discovers the upload location automatically, detects the OS, and drops into an interactive shell.
- No authentication required (pre-auth / 0-click).