Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| WordPress | wordpress-develop | >= 5.6.0, < 5.7.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WordPress - Authenticated XXE (CVE-2021-29447) | https://github.com/motikan2010/CVE-2021-29447 | POC Details |
| 2 | WordPress XXE vulnerability | https://github.com/Vulnmachines/wordpress_cve-2021-29447 | POC Details |
| 3 | Wordpress XXE injection 구축 자동화 및 PoC | https://github.com/dnr6419/CVE-2021-29447 | POC Details |
| 4 | None | https://github.com/AssassinUKG/CVE-2021-29447 | POC Details |
| 5 | None | https://github.com/b-abderrahmane/CVE-2021-29447-POC | POC Details |
| 6 | Arbitrary file read controller based on CVE-2021-29447 | https://github.com/elf1337/blind-xxe-controller-CVE-2021-29447 | POC Details |
| 7 | Proof of Concept for CVE-2021-29447 written in Python | https://github.com/Val-Resh/CVE-2021-29447-POC | POC Details |
| 8 | Exploit WordPress Media Library XML External Entity Injection (XXE) to exfiltrate files. | https://github.com/M3l0nPan/wordpress-cve-2021-29447 | POC Details |
| 9 | None | https://github.com/mega8bit/exploit_cve-2021-29447 | POC Details |
| 10 | A Golang program to automate the execution of CVE-2021-29447 | https://github.com/thomas-osgood/CVE-2021-29447 | POC Details |
| 11 | None | https://github.com/Abdulazizalsewedy/CVE-2021-29447 | POC Details |
| 12 | None | https://github.com/G01d3nW01f/CVE-2021-29447 | POC Details |
| 13 | CVE-2021-29447 - Authenticated XXE Injection - WordPress < 5.7.1 & PHP > 8 | https://github.com/viardant/CVE-2021-29447 | POC Details |
| 14 | A proof of concept exploit for a wordpress 5.6 media library vulnerability | https://github.com/0xRar/CVE-2021-29447-PoC | POC Details |
| 15 | None | https://github.com/andyhsu024/CVE-2021-29447 | POC Details |
| 16 | None | https://github.com/specializzazione-cyber-security/demo-CVE-2021-29447-lezione | POC Details |
| 17 | PoC for CVE-2021-29447 | https://github.com/magicrc/CVE-2021-29447 | POC Details |
| 18 | POC to exploit WordPress 5.6-5.7 (PHP 8+) Authenticated XXE Injection. | https://github.com/Tea-On/CVE-2021-29447-Authenticated-XXE-WordPress-5.6-5.7 | POC Details |
| 19 | The objective is to conduct a full-scale security assessment of a WordPress-based web application, culminating in a complete server compromise. The assessment will focus on exploiting a specific, real-world vulnerability (CVE-2021-29447) to achieve initial access. | https://github.com/ArtemCyberLab/Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets- | POC Details |
| 20 | A XXE payload generator | https://github.com/0xricksanchez/CVE-2021-29447 | POC Details |
| 21 | This repo describes about cve-2021-29447 and a small script for exploiting automatically | https://github.com/davids52/cve-2021-29447_auto-script | POC Details |
| 22 | None | https://github.com/rdana55/CVE-2021-29447-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet