Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ataurr | GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor | * ~ 2.1.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | GutenKit <= 2.1.0 - Unauthenticated Arbitrary File Upload | https://github.com/RandomRobbieBF/CVE-2024-9234 | POC Details |
| 2 | None | https://github.com/CallMeBatosay/CVE-2024-9234 | POC Details |
| 3 | None | https://github.com/Nxploited/CVE-2024-9234 | POC Details |
| 4 | The GutenKit Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9234.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet