Critical Vulnerabilities with Public Exploits
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,101 results
Clear all
CVE-2024-54363
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.32
nssTheme Wp NssUser Register <1.0.0 - Privilege Escalation
Incorrect Privilege Assignment vulnerability in saiful.total Wp NssUser Register wp-nssuser-register allows Privilege Escalation.This issue affects Wp NssUser Register: from n/a through <= 1.0.0.
CWE-266
Dec 16, 2024
CVE-2024-54262
9.9
CRITICAL
3 PoCs
Analysis
EPSS 0.48
Siddharth Nagar Import Export For WooCommerce <1.5 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in sidngr Import Export For WooCommerce import-export-for-woocommerce allows Upload a Web Shell to a Web Server.This issue affects Import Export For WooCommerce: from n/a through <= 1.6.2.
CWE-434
Dec 13, 2024
CVE-2024-10124
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.88
Vayu Blocks - Unauthorized Plugin Installation
The Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the tp_install() function in all versions up to, and including, 1.1.1. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. This vulnerability was partially patched in version 1.1.1.
CWE-284
Dec 12, 2024
CVE-2024-12209
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.89
WP Umbrella: Update Backup Restore & Monitoring <= 2.17.0 - Local File Inclusion
The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CWE-98
Dec 08, 2024
CVE-2024-52402
9.6
CRITICAL
2 PoCs
Analysis
EPSS 0.18
Cliconomics Exclusive Content Password Protect - CSRF
Cross-Site Request Forgery (CSRF) vulnerability in gunghoinc Exclusive Content Password Protect exclusive-content-password-protect allows Upload a Web Shell to a Web Server.This issue affects Exclusive Content Password Protect: from n/a through <= 1.1.0.
CWE-352
Nov 19, 2024
CVE-2024-52380
10.0
CRITICAL
4 PoCs
Analysis
EPSS 0.60
Picsmize <1.0.0 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in softpulseinfotech Picsmize picsmize allows Upload a Web Shell to a Web Server.This issue affects Picsmize: from n/a through <= 1.0.0.
CWE-434
Nov 14, 2024
CVE-2024-52375
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.61
Arttia Creative Datasets Manager <1.5 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in Arttia Creative Datasets Manager by Arttia Creative datasets-manager-by-arttia-creative.This issue affects Datasets Manager by Arttia Creative: from n/a through <= 1.5.
CWE-434
Nov 14, 2024
CVE-2024-51788
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.62
The Novel Design Store Directory <4.3.0 - Unrestricted Upload of Fi...
Unrestricted Upload of File with Dangerous Type vulnerability in Joshua Wolfe The Novel Design Store Directory noveldesign-store-directory allows Upload a Web Shell to a Web Server.This issue affects The Novel Design Store Directory: from n/a through <= 4.3.0.
CWE-434
Nov 11, 2024
CVE-2024-10586
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
EPSS 0.59
WordPress Debug Tool <2.3 - RCE
The Debug Tool plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the dbt_pull_image() function and missing file type validation in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to to create arbitrary files such as .php files that can be leveraged for remote code execution. CVE-2024-52416 may be a duplicate of this issue.
CWE-862
Nov 09, 2024
CVE-2024-9933
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.37
WatchTowerHQ <3.9.6 - Auth Bypass
The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
CWE-288
Oct 26, 2024
CVE-2024-49668
10.0
CRITICAL
2 PoCs
Analysis
EPSS 0.59
Verbalize WP - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in christopherdewese1099 Verbalize WP verbalize-wp allows Upload a Web Shell to a Web Server.This issue affects Verbalize WP: from n/a through <= 1.0.
CWE-434
Oct 23, 2024
CVE-2024-49653
9.9
CRITICAL
2 PoCs
Analysis
EPSS 0.59
James Eggers Portfolleo <1.2 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in james-eggers Portfolleo portfolleo allows Upload a Web Shell to a Web Server.This issue affects Portfolleo: from n/a through <= 1.2.
CWE-434
Oct 23, 2024
CVE-2024-49328
9.8
CRITICAL
3 PoCs
Analysis
EPSS 0.42
Vivektamrakar WP Rest API Fns < 1.0.0 - Missing Authentication
Authentication Bypass Using an Alternate Path or Channel vulnerability in vivek2tamrakar WP REST API FNS rest-api-fns allows Authentication Bypass.This issue affects WP REST API FNS: from n/a through <= 1.0.0.
CWE-288
Oct 20, 2024
CVE-2024-9234
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.93
GutenKit - Unauthenticated RCE
The GutenKit – Page Builder Blocks, Patterns, and Templates for Gutenberg Block Editor plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the install_and_activate_plugin_from_external() function (install-active-plugin REST API endpoint) in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins, or utilize the functionality to upload arbitrary files spoofed like plugins.
CWE-862
Oct 11, 2024
CVE-2024-6460
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Grow by Tradedoubler <2.0.21 - Code Injection
The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
Aug 16, 2024
CVE-2024-6366
9.1
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.91
User Profile Builder <3.11.8 - Info Disclosure
The User Profile Builder WordPress plugin before 3.11.8 does not have proper authorisation, allowing unauthenticated users to upload media files via the async upload functionality of WP.
CWE-434
Jul 29, 2024
CVE-2024-2667
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.91
InstaWP Connect <= 0.1.0.22 - Unauthenticated Arbitrary File Upload
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
CWE-434
May 02, 2024
CVE-2024-31114
9.1
CRITICAL
2 PoCs
Analysis
EPSS 0.49
biplob018 Shortcode Addons <3.2.5 - RCE
Unrestricted Upload of File with Dangerous Type vulnerability in biplob018 Shortcode Addons.This issue affects Shortcode Addons: from n/a through 3.2.5.
CWE-434
Mar 31, 2024
CVE-2024-44902
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
EPSS 0.84
Thinkphp 6.1.3-8.0.4 - Code Injection
A deserialization vulnerability in Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code.
CWE-502
Sep 09, 2024
CVE-2024-7591
10.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.31
Kemptechnologies Loadmaster < 7.2.60.0 - OS Command Injection
Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects:
* LoadMaster: 7.2.40.0 and above
* ECS: All versions
* Multi-Tenancy: 7.1.35.4 and above
CWE-78
Sep 05, 2024