cve/2024/CVE-2024-6624.md

23 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-6624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6624)
![](https://img.shields.io/static/v1?label=Product&message=JSON%20API%20User&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cve-scores
2025-09-29 16:08:36 +00:00
- https://github.com/Jenderal92/CVE-2024-6624
- https://github.com/RandomRobbieBF/CVE-2024-6624
2025-09-29 21:09:30 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00