Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-8856 PoC — Backup and Staging by WP Time Capsule <= 1.22.21 - Unauthenticated Arbitrary File Upload

Source
Associated Vulnerability
Title:Backup and Staging by WP Time Capsule <= 1.22.21 - Unauthenticated Arbitrary File Upload (CVE-2024-8856)
Description:The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Description
This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.
Readme
# CVE-2024-8856

<p>This tool scans WordPress websites for vulnerabilities in the <b>WP Time Capsule</b> plugin related to <b>CVE-2024-8856</b>. 
It identifies plugin versions below "1.22.22" as vulnerable and logs results to "vuln.txt". 
Simple and efficient, it helps security researchers and admins detect and address risks quickly.</p>

## Features
<ul dir="auto">
<li>Scans a list of URLs to detect vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.</li>
<li>Identifies plugin versions below <strong>1.22.22</strong> as vulnerable (e.g., 1.22.21, 1.22.20).</li>
<li>Uses Python libraries such as "requests" to send HTTP requests and check for plugin versions.</li>
<li>Supports multithreading to speed up the scanning process across multiple sites simultaneously.</li>
<li>Displays scan results with the vulnerability status: vulnerable or not vulnerable based on the version.</li>
<li>The found vulnerable sites are saved to a result file ("vuln.txt")</li>
</ul>

## Buy Coffee :
<ul dir="auto">
<li>Bitcoin $: 14nXhmRiQx5joCXFTdR8ydm3T8et7MFDXC</li>
<li>Saweria $: https://saweria.co/Shin403</li>
<li>Trakteer $: https://trakteer.id/shin403</li>
<li>Buymeacoffee $: https://www.buymeacoffee.com/shin.code</li>
<li>Ko-Fi $: https://ko-fi.com/shincode403</li>
</ul>

![Jenderal92 CVE-2024-8856](https://github.com/user-attachments/assets/39ae4cfb-fa89-4f8f-a80e-d7ec2534fce7)


## How To Run?
<ul dir="auto">
<li>Download and install Python from the official Python website: <a href="https://www.python.org">https://www.python.org</a>.</li>
<li>Install the required modules using the command: <code>pip install requests</code>.</li>
<li>Run the script with: <code>python file.py</code>.</li>
<li>Provide a list of sites (e.g., url.txt) as input.</li>
</ul>

## Disclaimer !!!

<p>I have written the disclaimer on the cover of Jenderal92. You can check it <a href="https://github.com/Jenderal92">HERE !!!</a></p>
File Snapshot

[4.0K] /data/pocs/675ef553c8b2d17b76fc6c27e6a3048c981901ac ├── [2.0K] CVE-2024-8856.py └── [1.9K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →