Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WonderCMS Authenticated RCE - CVE-2023-41425 | https://github.com/prodigiousMind/CVE-2023-41425 | POC Details |
| 2 | Wonder CMS RCE (XSS) | https://github.com/charlesgargasson/CVE-2023-41425 | POC Details |
| 3 | WonderCMS RCE CVE-2023-41425 | https://github.com/insomnia-jacob/CVE-2023-41425 | POC Details |
| 4 | Research | https://github.com/tiyeume25112004/CVE-2023-41425 | POC Details |
| 5 | Cross Site Scripting vulnerability in Wonder CMS v.3.2.0 thru v.3.4.2 allows a remote attacker to execute arbitrary code via a crafted script uploaded to the installModule component. | https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCE | POC Details |
| 6 | None | https://github.com/Raffli-Dev/CVE-2023-41425 | POC Details |
| 7 | CVE-2023-41425 (Wonder CMS XSS to RCE) exploit which serves required scripts locally. Good if you're lost at sea and have found a problem with your bike. | https://github.com/duck-sec/CVE-2023-41425 | POC Details |
| 8 | CVE-2023-41425 Refurbish | https://github.com/TanveerS1ngh/WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425 | POC Details |
| 9 | Writing one because the one I found isn't working | https://github.com/h3athen/CVE-2023-41425 | POC Details |
| 10 | CVE-2023-41425 Refurbish | https://github.com/0xDTC/WonderCMS-4.3.2-XSS-to-RCE-Exploits-CVE-2023-41425 | POC Details |
| 11 | Xss injection, WonderCMS 3.2.0 -3.4.2 | https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE | POC Details |
| 12 | CVE-2023-41425 (XSS to RCE, Wonder CMS 3.2.0 <= 3.4.2) | https://github.com/0x0d3ad/CVE-2023-41425 | POC Details |
| 13 | Research | https://github.com/SpycioKon/CVE-2023-41425 | POC Details |
| 14 | Wonder CMS v3.2.0 - v3.4.2 XSS to RCE exploit | https://github.com/xpltive/CVE-2023-41425 | POC Details |
| 15 | None | https://github.com/samu21req/CVE-2023-41425 | POC Details |
| 16 | None | https://github.com/KGorbakon/CVE-2023-41425 | POC Details |
| 17 | WonderCMS RCE CVE-2023-41425 | https://github.com/Twappz/CVE-2023-41425 | POC Details |
| 18 | WonderCMS v3.4.2 NSE Discovery Script | https://github.com/becrevex/CVE-2023-41425 | POC Details |
| 19 | Automates creation and hosting of a JavaScript XSS payload to install a malicious theme module, triggering a reverse shell via Remote Code Execution in WonderCMS. This tool uses PentestMonkey's PHP reverse shell script as the payload | https://github.com/Tea-On/CVE-2023-41425-RCE-WonderCMS-4.3.2 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet