Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | WooCommerce Payments WordPress Plugin | Fixed version 5.6.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WooCommerce Payments: Unauthorized Admin Access Exploit | https://github.com/gbrsh/CVE-2023-28121 | POC Details |
| 2 | CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ] | https://github.com/im-hanzou/Mass-CVE-2023-28121 | POC Details |
| 3 | CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ] | https://github.com/rio128128/Mass-CVE-2023-28121-kdoec | POC Details |
| 4 | None | https://github.com/C04LA/CVE-2023-28121 | POC Details |
| 5 | Python 2.7 | https://github.com/Jenderal92/WP-CVE-2023-28121 | POC Details |
| 6 | None | https://github.com/1337nemojj/CVE-2023-28121 | POC Details |
| 7 | WooCommerce Payments =< 5.6.1 CVE-2023-28121 PoC | https://github.com/sug4r-wr41th/CVE-2023-28121 | POC Details |
| 8 | An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-28121.yaml | POC Details |
| 9 | None | https://github.com/0axz-tools/CVE-2023-28121 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet