Unauthenticated Remote Code Execution Vulnerability in GEO WP WordPress Plugin
CVE-2024-6330

Currently unrated

Key Information:

Vendor

Wordpress

Status
Vendor
CVE Published:
19 August 2024

Badges

👾 Exploit Exists🟡 Public PoC🟣 EPSS 48%

What is CVE-2024-6330?

The GEO my WP WordPress plugin before 4.5.0.2 does not prevent unauthenticated attackers from including arbitrary files in PHP's execution context, which leads to Remote Code Execution.

Affected Version(s)

GEO my WP 0 < 4.5.0.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

48% chance of being exploited in the next 30 days.

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Michael Dyrna
WPScan
.