{"uuid": "3701b766-d67e-494b-bab5-2197df31db68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0757", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/1081", "content": "\ud83d\udea8POC RELEASED\ud83d\udea8A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE)\n\nThe Insert or Embed Articulate Content into WordPress plugin for WordPress is vulnerable to arbitrary file uploads through insecure file uploads in a zip archive in all versions up to, and including, 4.3000000023. This makes it possible for unauthenticated attackers to upload zip files containing phar files on the affected site's server which may make remote code execution possible.\n\nCVSS: 8.8 (High) [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H]\nSoftware Type: Plugin\nSoftware Slug: insert-or-embed-articulate-content-into-wordpress\nAffected Version: &lt;= 4.3000000023\n\nhttps://x.com/DarkWebInformer/status/1803111898163920900", "creation_timestamp": "2024-06-18T19:09:04.000000Z"}