Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| revmakx | Backup and Staging by WP Time Capsule | * ~ 1.22.21 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WordPress WP Time Capsule Plugin Arbitrary File Upload Vulnerability | https://github.com/ubaii/CVE-2024-8856 | POC Details |
| 2 | This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly. | https://github.com/Jenderal92/CVE-2024-8856 | POC Details |
| 3 | WordPress WP Time Capsule Plugin Arbitrary File Upload Vulnerability | https://github.com/ubaydev/CVE-2024-8856 | POC Details |
| 4 | The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-8856.yaml | POC Details |
| 5 | None | https://github.com/Evillm/CVE-2024-8856-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet