Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| WordPress Foundation | WordPress | 6.0 ~ 6.0.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-4439 PoC | https://github.com/MielPopsssssss/CVE-2024-4439 | POC Details |
| 2 | The provided exploit code leverages a stored Cross-Site Scripting (XSS) vulnerability (CVE-2024-4439) in WordPress Core versions up to 6.5.1. | https://github.com/d0rb/CVE-2024-4439 | POC Details |
| 3 | WordPress Core < 6.5.2 - Unauthenticated & Authenticated (Contributor+) Stored Cross-Site Scripting via Avatar Block | https://github.com/xssor-dz/-CVE-2024-4439 | POC Details |
| 4 | aa | https://github.com/soltanali0/CVE-2024-4439 | POC Details |
| 5 | CVE-2024-4439 docker and poc | https://github.com/w0r1i0g1ht/CVE-2024-4439 | POC Details |
| 6 | WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4439.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet