Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme. | https://github.com/j4k0m/CVE-2021-24499 | POC Details |
| 2 | None | https://github.com/hh-hunter/cve-2021-24499 | POC Details |
| 3 | None | https://github.com/jytmX/CVE-2021-24499 | POC Details |
| 4 | WordPress Workreap theme is susceptible to remote code execution. The AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-24499.yaml | POC Details |
| 5 | WordPress Theme Workreap 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution | https://github.com/jayhutajulu1/CVE-2021-24499 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet