🎯 Want to practice with the new WordPress CVE ? Follow the instructions
- Install Docker : https://docs.docker.com/get-docker/
- Clone the project :
git clone https://github.com/Trackflaw/CVE-2024-1071-Docker.git
. - Go to the project :
cd CVE-2024-1071-Docker
- Launch the Docker Compose file :
docker compose up -d
. - Connect to
http://localhost
withroot:root
credentials. - Activate the plugin in http://localhost/wp-admin/plugins.php
- Activate
Enable the use of a custom table for account metadata
option in http://localhost/wp-admin/admin.php?page=um_options&tab=misc
Exploit.Wordpress.mp4
Many PoCs are available online to automate the exploitation of this vulnerability: