Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Royal Elementor Addons and Templates | 0 ~ 1.3.79 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-5360 Auto Shell Upload WordPress Royal Elementor 1.3.78 Shell Upload | https://github.com/sagsooz/CVE-2023-5360 | POC Details |
| 2 | None | https://github.com/phankz/Worpress-CVE-2023-5360 | POC Details |
| 3 | CVE-2023-5360 | https://github.com/nastar-id/CVE-2023-5360 | POC Details |
| 4 | Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360. | https://github.com/Chocapikk/CVE-2023-5360 | POC Details |
| 5 | Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: CVE-2023-5360. | https://github.com/tucommenceapousser/CVE-2023-5360 | POC Details |
| 6 | Python 2.7 | https://github.com/Jenderal92/WP-CVE-2023-5360 | POC Details |
| 7 | The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE. | https://github.com/Pushkarup/CVE-2023-5360 | POC Details |
| 8 | CVE-2023-5360 Exploit/POC | https://github.com/1337r0j4n/CVE-2023-5360 | POC Details |
| 9 | CVE-2023-5360 EXPLOIT | https://github.com/angkerithhack001/CVE-2023-5360-PoC | POC Details |
| 10 | Arbitrary File Upload vulnerability in WordPress Royal Elementor Addons Plugin. This could allow a malicious actor to upload any type of file to your website. This can include backdoors which are then executed to gain further access to your website. This vulnerability has been fixed in version 1.3.79 | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-5360.yaml | POC Details |
| 11 | Royal Elementor Addons - Unauthenticated Remote Code Execution | https://github.com/X3RX3SSec/CVE-2023-5360 | POC Details |
| 12 | CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤ 1.3.78), written in pure Python. | https://github.com/LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-5458 | CITS Support svg, webp Media and TTF,OTF File Upload < 3.0 - Author+ Stored XSS via SVG | |
| CVE-2023-5229 | E2Pdf < 1.20.20 - Admin+ Stored Cross-Site Scriping | |
| CVE-2023-5307 | Photos and Files Contest Gallery – Contact Form < 21.2.8.1 - Unauthenticated Stored XSS vi | |
| CVE-2023-5243 | Login screen manager <= 3.5.2 - Admin+ Stored XSS | |
| CVE-2023-4823 | WP Meta and Date Remover < 2.2.0 - Subscriber+ Stored XSS | |
| CVE-2023-5519 | EventPrime < 3.2.0 - Booking Creation via CSRF | |
| CVE-2023-5238 | EventPrime < 3.2.0 - Reflected HTML Injection on keyword parameter | |
| CVE-2023-5098 | Campaign Monitor Forms < 2.5.6 - Subscriber+ Arbitrary Options Update | |
| CVE-2023-5237 | Memberlite Shortcodes < 1.3.9 - Contributor+ Stored XSS via Shortcode | |
| CVE-2023-4390 | Popup box < 3.7.2 - Admin+ Stored Cross-Site Scripting | |
| CVE-2023-5211 | Fattura24 < 6.2.8 - Reflected Cross-Site Scripting | |
| CVE-2023-4836 | WordPress File Sharing Plugin < 2.0.5 - Subscriber+ Sensitive Data and Files Exposure via | |
| CVE-2023-4251 | EventPrime < 3.2.0 - Booking Creation via CSRF | |
| CVE-2023-4250 | EventPrime < 3.2.0 - Reflected XSS |
No comments yet