Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Redux.io | Gutenberg Template Library & Redux Framework | 4.2.11 ~ 4.2.11 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated Sensitive Information Disclosure (CVE-2021–38314). | https://github.com/orangmuda/CVE-2021-38314 | POC Details |
| 2 | None | https://github.com/phrantom/cve-2021-38314 | POC Details |
| 3 | None | https://github.com/shubhayu-64/CVE-2021-38314 | POC Details |
| 4 | cve-2021-38314 - Unauthenticated Sensitive Information Disclosure | https://github.com/twseptian/cve-2021-38314 | POC Details |
| 5 | Python exploit for CVE-2021-38314 | https://github.com/c0ff33b34n/CVE-2021-38314 | POC Details |
| 6 | CVE-2021-38314 Python Exploit | https://github.com/akhilkoradiya/CVE-2021-38314 | POC Details |
| 7 | Exploit in python3 to explore CVE-2021-38314 in Redux Framework a wordpress plugin | https://github.com/0xGabe/CVE-2021-38314 | POC Details |
| 8 | WordPress Redux Framework plugin through 4.2.11 is susceptible to information disclosure. The plugin registers several unique AJAX actions available to unauthenticated users in the includes function in redux-core/class-redux-core.php. These are predictable, given that they are based on an md5 hash of the site URL with a known salt value of -redux and an md5 hash of the previous hash with a known salt value of -support. An attacker can potentially employ these AJAX actions to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of the site's AUTH_KEY concatenated with the SECURE_AUTH_KEY. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-38314.yaml | POC Details |
| 9 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/WordPress%20Redux%20Framework%20class-redux-helpers.php%20%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E%20CVE-2021-38314.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet