Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-7954
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
SPIP porte_plume Plugin Arbitrary PHP Execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
动态执行代码中指令转义处理不恰当(Eval注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
SPIP 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SPIP是SPIP开源的一个用于创建 Internet 站点的免费软件。 SPIP存在安全漏洞,该漏洞源于容易受到任意代码执行漏洞的影响,远程未经身份验证的攻击者可以通过发送精心设计的HTTP请求以SPIP用户身份执行任意PHP。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SPIPSPIP 4.3.0-alpha ~ 4.3.0-alpha2 -
II. Public POCs for CVE-2024-7954
#POC DescriptionSource LinkShenlong Link
1Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12https://github.com/Chocapikk/CVE-2024-7954POC Details
2This exploit will attempt to execute system commands on SPIP targets.https://github.com/bigb0x/CVE-2024-7954POC Details
3Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 https://github.com/fa-rrel/CVE-2024-7954-RCEPOC Details
4Nonehttps://github.com/TheCyberguy-17/RCE_CVE-2024-7954POC Details
5Nonehttps://github.com/MuhammadWaseem29/RCE-CVE-2024-7954POC Details
6The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.https://github.com/issamiso/CVE-2024-7954POC Details
7Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 https://github.com/gh-ost00/CVE-2024-7954-RCEPOC Details
8The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.https://github.com/issamjr/CVE-2024-7954POC Details
9SPIP 4.30-alpha2、4.2.13、4.1.16之前的版本使用的porte_plume插件存在任意代码执行漏洞,远程未经身份验证的攻击者可以通过发送精心设计的HTTP 请求以SPIP用户身份执行任意PHP代码。https://github.com/zxj-hub/CVE-2024-7954POCPOC Details
10The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. (CRITICAL)https://github.com/0dayan0n/RCE_CVE-2024-7954-POC Details
11Nonehttps://github.com/Arthikw3b/RCE-CVE-2024-7954POC Details
12The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-7954.yamlPOC Details
13Nonehttps://github.com/r0otk3r/CVE-2024-7954POC Details
14Nonehttps://github.com/nak000/RCE-CVE-2024-7954POC Details
15Exploitation of a Remote Code Execution vulnerability- (CVE-2024-7954)https://github.com/ShivanshKuntal/Exploitation-of-a-Remote-Code-Execution-vulnerability--CVE-2024-7954-POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-7954
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-7954
Anonymous User
2025-09-12 23:38:30

HorsePower Brands Omaha 2525 N 117tһ Avee #300, Omaha, NE 68164, United Stаtes 14029253112 Bookmarks

Anonymous User
2026-03-08 04:39:15

https://globalwindday.org/wp-content/uploads/event-manager-uploads/event_banner/Emirates-Airlines-Book-Next-Flight-Out-by-Phone-Guide.pdf I do not even know how I ended up here, but I thought this post was great. I don't know who you are but certainly you are going to a famous blogger if you are not already ;) Cheers! https://globalwindday.org/wp-content/uploads/event-manager-uploads/event_banner/Emirates-Airlines-Book-Next-Flight-Out-by-Phone-Guide.pdf

Anonymous User
2026-03-10 06:12:40

https://www.unsolvedcasefiles.com I am regular reader, how are you everybody? This post posted at this site is truly good.

Anonymous User
2026-03-10 19:47:41

https://waiver.smartwaiver.com/e/GNbgYTWgaoZ2DV7TwYTqM7/web/ Yes! Finally someone writes about como. https://waiver.smartwaiver.com/e/GNbgYTWgaoZ2DV7TwYTqM7/web/

Anonymous User
2026-03-11 12:08:49

Prime Secured 3603 N 222nd St, Suite 102, Elkhorn, NE 68022, United Stateѕ 402-289-4126 Pro Threat Secure

Anonymous User
2026-03-11 14:17:47

Modern Purair 416 Meridian Ꭱd SΕ #14Α, Calgary AB T2Α 1X2, Canada (403) 800-7254 respiratory health

Anonymous User
2026-03-12 07:24:13

Franchising Path Carlsbad Carlsbad, ᏟΑ 92008, United Stаtes +18587536197 how tօ start a jamba juice Franchise

Anonymous User
2026-03-14 21:55:52

Boston Medical Group 3152Red Hill Ave. Ste. #280, Costa Mesa, ϹΑ 92626, United Stаtеѕ 800 337 7555 Bookmarks

Anonymous User
2026-03-14 23:50:41

Concert Attire Stamford 360 Fairfield Ave, Stamford, CT 06902, United Տtates +12033298603 Fundraising chair

Anonymous User
2026-03-15 01:58:57

Cabinet IQ 8305 Ѕtate Hwy 71 #110, Austin, TX 78735, United Ꮪtates 254-275-5536 Cabinetexperts

Anonymous User
2026-03-17 07:55:50

recarga free fire,centro de recarga free fire,diamantes free fire,recargas free fire,recargar diamantes free fire,recargar diamantes free fire por id,recarga de free fire,recarga diamantes free fire,como recargar diamantes en free fire,garena free fire recarga,comprar diamantes para free fire,recargar free fire,free fire recarga,free fire recargasChoosing a protected, fast, and economical Wuthering Waves buy Lunite solution enables you to concentrate on what absolutely matters-- taking pleasure in the game.

Anonymous User
2026-03-17 10:39:36

wuthering waves buy lunite,wuthering waves top up,free fire diamonds top up,free fire top upPicking a safe and secure, quick, and inexpensive Wuthering Waves buy Lunite solution allows you to focus on what genuinely matters-- enjoying the game.

Anonymous User
2026-03-18 16:51:42

pubg mobile uc top up,pubg uc top upSelecting a secure, quickly, and budget friendly Wuthering Waves buy Lunite solution enables you to focus on what genuinely matters-- taking pleasure in the game.

Anonymous User
2026-03-20 07:06:45

i m best seo expert https://www.imipe.org.mx/sites/default/files/webform/buzonoic/how-do-i-change-my-flight-on-the-chase-travel-portal-complete-guide-for-2026.pdf Mr. Tikki Bajaj


Leave a comment