Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| nmedia | Simple User Registration | * ~ 6.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Simple User Registration <= 6.3 - Unauthenticated Privilege Escalation | https://github.com/Nxploited/CVE-2025-4334 | POC Details |
| 2 | The Simple User Registration plugin ≤ 6.3 is vulnerable to privilege escalation. It lacks proper restrictions on user meta values during registration. Unauthenticated attackers can exploit this to register as administrators. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-4334.yaml | POC Details |
| 3 | Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple User Registration WordPress plugin (<= 6.3), allowing unauthenticated attackers to create administrator accounts. | https://github.com/0xgh057r3c0n/CVE-2025-4334 | POC Details |
| 4 | Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple User Registration WordPress plugin (<= 6.3), allowing unauthenticated attackers to create administrator accounts. | https://github.com/zr1p3r/CVE-2025-4334 | POC Details |
| 5 | The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator. | https://github.com/vinodwick/CVE-2025-4334 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet