Exploit for Missing Authentication for Critical Function in Really-Simple-Plugins Really_Simple_Security
Discription

image
WordPress CVE-2024-10924 Penetration Testing Report 2FA Bypass Vulnerability in Really Simple SSL Plugin ๐Ÿ“‹ Table of Contents Executive Summary Target Information Methodology Timeline Reconnaissance Phase Vulnerability Analysis Attack Flow Exploitation Impact Assessment Remediation Tools Used References Appendices ๐ŸŽฏ Executive Summary Target: https://skior.co Vulnerability: CVE-2024-10924 – 2FA Bypass in Really Simple SSL Plugin Severity: Critical (CVSS Score: 9.8) Status: Successfully Exploited Discovery Date: 2025-06-25 Report Version: 2.1 This penetration test discovered a critical authentication bypass vulnerability that allows unauthenticated attackers to gain administrative access to the WordPress site by bypassing two-factor authentication (2FA) controls. Key Findings โœ… WordPress 6.8.1 with Really Simple SSL plugin installed โœ… 2FA bypass vulnerability successfully exploited โœ… Administrative access obtained for user "pastor" โœ… Valid session cookies captured โœ… Complete control over WordPress administration panel โœ… Zero-day vulnerability (no public exploit available at time of discovery) Risk Assessment Matrix | Risk Level | Probability | Impact | Mitigation Priority | |————|————-|——–|——————-| | Critical | High | Complete System Compromise | Immediate | | High | Medium | Data Breach | High | | Medium | Low | Service Disruption | Medium | ๐ŸŽฏ Target Information | Field | Value | |——-|——-| | Domain | https://skior.co | | IP…Read More

Back to Main

Subscribe for the latest news: