Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| instawp | InstaWP Connect – 1-click WP Staging & Migration | * ~ 0.1.0.22 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is POC for CVE-2024-2667 (InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload) | https://github.com/Puvipavan/CVE-2024-2667 | POC Details |
| 2 | None | https://github.com/Nxploited/CVE-2024-2667-Poc | POC Details |
| 3 | The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-2667.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet