高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| nmedia | Simple User Registration | * ~ 6.3 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Simple User Registration <= 6.3 - Unauthenticated Privilege Escalation | https://github.com/Nxploited/CVE-2025-4334 | POC詳細 |
| 2 | The Simple User Registration plugin ≤ 6.3 is vulnerable to privilege escalation. It lacks proper restrictions on user meta values during registration. Unauthenticated attackers can exploit this to register as administrators. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-4334.yaml | POC詳細 |
| 3 | Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple User Registration WordPress plugin (<= 6.3), allowing unauthenticated attackers to create administrator accounts. | https://github.com/0xgh057r3c0n/CVE-2025-4334 | POC詳細 |
| 4 | Proof-of-concept exploit for CVE-2025-4334, a privilege escalation vulnerability in the Simple User Registration WordPress plugin (<= 6.3), allowing unauthenticated attackers to create administrator accounts. | https://github.com/zr1p3r/CVE-2025-4334 | POC詳細 |
| 5 | The Simple User Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3. This is due to insufficient restrictions on user meta values that can be supplied during registration. This makes it possible for unauthenticated attackers to register as an administrator. | https://github.com/vinodwick/CVE-2025-4334 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成まだコメントはありません