This is a Python script that exploits the CVE-2024-6624 vulnerability in the JSON API User <= 3.9.3 plugin for WordPress. This tool allows unauthenticated attackers to register new users and escalate their privileges to administrator without authorization.
-
Ensure that Python 2.7 is installed on your system.
-
Install the
requests
dependency:pip install requests
-
Prepare a text file (
urls.txt
) containing a list of target URLs (one URL per line).
-
Run the script:
python CVE-2024-6624.py
-
Enter the filename containing the target URLs when prompted:
Enter the filename containing the URL list: urls.txt
-
The script will process each URL in the list and attempt to exploit the vulnerability.
-
Successful exploit results will be saved in the
admin.txt
file in the following format:http://example.com/wp-login.php|ngocoxscrew|ngocoxs_crews+
I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!