Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Modular DS | Modular DS | 0 ~ 2.5.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | authorized CYBERDUDEBIVASH ECOSYSTEM tool for detecting CVE-2026-23550 in WordPress Modular DS plugin | https://github.com/cyberdudebivash/CYBERDUDEBIVASH-Modular-DS-CVE-2026-23550-Detector | POC Details |
| 2 | Modular DS = 2.5.1 contains a broken access control vulnerability caused by incorrect privilege assignment, letting attackers escalate their privileges, exploit requires no special conditions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-23550.yaml | POC Details |
| 3 | CVE-2026-23550 - Modular DS WordPress Plugin **Unauthenticated Admin Access** | https://github.com/TheTorjanCaptain/CVE-2026-23550-PoC | POC Details |
| 4 | CVE-2026-23550 | https://github.com/O99099O/By-Poloss..-..CVE-2026-23550 | POC Details |
| 5 | Mass CVE-2026-23550 Exploit | https://github.com/dzmind2312/Mass-CVE-2026-23550-Exploit | POC Details |
| 6 | 🔴 EpSiLoNPoInT - CVE-2026-23550 Modular DS Zero-Click **Framework d'exploitation Modular DS Admin Bypass** ## 🎯 CVE Ciblée Principale **CVE-2026-23550** : Modular DS WordPress Plugin - 40 000+ sites affectés - Accès admin **zéro-clic** non authentifié - `exploitmass.py` (48KB) - Exploit massif ## Modules | https://github.com/epsilonpoint88-glitch/EpSiLoNPoInT- | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.