nomisec
WORKING POC
1,714 stars
by lockedbyte · client-side
https://github.com/lockedbyte/CVE-2021-40444
This repository contains a functional proof-of-concept exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It generates a malicious docx file and hosts an exploit server to deliver a payload (e.g., a DLL) via a crafted CAB file.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
Python 3 · lcab · DLL payload · HTTP server
nomisec
WORKING POC
823 stars
by klezVirus · client-side
https://github.com/klezVirus/CVE-2021-40444
This repository contains a fully weaponized exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes a generator for malicious docx files that leverage a CAB file with a ZipSlip vulnerability to achieve arbitrary code execution via DLL side-loading.
Classification
Working Poc 95%
Target:
Microsoft Office Word (pre-patch versions)
No auth needed
Prerequisites:
Victim opens a malicious docx file · Microsoft Office Word with vulnerable version · Network access to a controlled server hosting malicious files
nomisec
WORKING POC
170 stars
by aslitsecurity · client-side
https://github.com/aslitsecurity/CVE-2021-40444_builders
This repository contains a working proof-of-concept exploit for CVE-2021-40444, a remote code execution vulnerability in Microsoft Office. The exploit generates malicious documents and files to trigger the vulnerability via crafted CAB files and Office documents.
Classification
Working Poc 95%
Target:
Microsoft Office (MSHTML)
No auth needed
Prerequisites:
Microsoft Office installation · Crafted malicious document or CAB file
nomisec
WORKING POC
104 stars
by Edubr2020 · poc
https://github.com/Edubr2020/CVE-2021-40444--CABless
This PoC demonstrates CVE-2021-40444 by exploiting a Microsoft Office MSHTML vulnerability via a crafted HTML file and a RAR archive containing a WSF script. The attack leverages ActiveX to execute arbitrary code without requiring a CAB archive.
Classification
Working Poc 90%
Target:
Microsoft Office (MSHTML)
No auth needed
Prerequisites:
Victim must open the malicious HTML file · RAR archive with embedded WSF script must be accessible
nomisec
WORKING POC
66 stars
by 34zY · client-side
https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit
This is a Metasploit module that generates a malicious DOCX file exploiting CVE-2021-40444, a Microsoft Office Word MSHTML RCE vulnerability. It crafts a malicious ActiveX control to achieve remote code execution on vulnerable Windows systems.
Classification
Working Poc 95%
Target:
Microsoft Office Word (vulnerable versions)
No auth needed
Prerequisites:
Vulnerable Microsoft Office Word installation · User interaction to open the malicious DOCX file
nomisec
WRITEUP
19 stars
by k8gege · poc
https://github.com/k8gege/CVE-2021-40444
This repository provides a detailed writeup and usage instructions for exploiting CVE-2021-40444, a Microsoft MSHTML remote code execution vulnerability. It includes steps for generating malicious DLLs, creating exploit documents, and executing payloads via Office files.
Classification
Writeup 90%
Target:
Microsoft Office (2019 and others) on Windows 7/8/8.1/10, Windows Server 2008-2022
No auth needed
Prerequisites:
Ladon toolkit · Access to generate and host malicious files · Victim interaction to open the malicious document
nomisec
WRITEUP
16 stars
by ozergoker · poc
https://github.com/ozergoker/CVE-2021-40444
This repository provides a writeup and mitigation steps for CVE-2021-40444, a Microsoft MSHTML Remote Code Execution vulnerability. It includes registry modifications to disable ActiveX controls in Internet Explorer as a workaround.
Classification
Writeup 90%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
Prerequisites:
Victim must open a malicious Office document or visit a malicious webpage
nomisec
WORKING POC
13 stars
by mansk1es · poc
https://github.com/mansk1es/Caboom
This PoC exploits CVE-2021-40444, a remote code execution vulnerability in Microsoft MSHTML via a malicious ActiveX control in a crafted Office document. It generates a malicious .cab file by embedding a DLL or INF file and modifying offset bytes to trigger the vulnerability.
Classification
Working Poc 90%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
Prerequisites:
A crafted DLL or INF file · CABARC.EXE utility · Victim interaction to open the malicious document
nomisec
WORKING POC
9 stars
by kagura-maru · poc
https://github.com/kagura-maru/CVE-2021-40444-POC
This repository provides a proof-of-concept for CVE-2021-40444, a Microsoft MSHTML Remote Code Execution vulnerability. It uses Metasploit to generate a malicious DLL payload and embeds it in a Word document to achieve RCE via a reverse TCP shell.
Classification
Working Poc 95%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
Prerequisites:
Metasploit Framework · Python 3 · msfvenom · HTTP server for hosting payload
nomisec
WORKING POC
9 stars
by H0j3n · client-side
https://github.com/H0j3n/CVE-2021-40444
This repository contains a Python script (`gen.py`) that automates the generation of malicious Microsoft Office documents exploiting CVE-2021-40444, a remote code execution vulnerability in MSHTML. The script modifies a .docx file to include a malicious payload hosted on a remote server, leveraging obfuscation techniques like HTML entity encoding and UTF-16BE encoding.
Classification
Working Poc 95%
Target:
Microsoft Office (MSHTML)
No auth needed
Prerequisites:
A modified .docx file with an embedded Bitmap Object · A payload (.dll) · A web server to host the malicious files
github
WORKING POC
8 stars
by codecat007 · cpoc
https://github.com/codecat007/cvehub/tree/main/windows/CVE-2021-40444
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes scripts to generate malicious DOCX files and a server to host the exploit payload, demonstrating the vulnerability by executing arbitrary DLLs.
Classification
Working Poc 95%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
DLL payload · HTTP server to host exploit files · Target system with vulnerable Microsoft Office Word
nomisec
WRITEUP
7 stars
by DarkSprings · poc
https://github.com/DarkSprings/CVE-2021-40444
The repository contains only a README.md file with a public key and minimal information about CVE-2021-40444, lacking any functional exploit code or technical details. It appears to be a placeholder or incomplete documentation.
Classification
Writeup 90%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
Prerequisites:
None specified
nomisec
WRITEUP
5 stars
by LazarusReborn · poc
https://github.com/LazarusReborn/Docx-Exploit-2021
This repository contains a README describing a .docx exploit related to CVE-2021-40444, which leverages malicious files embedded in .docx resources. No actual exploit code is provided.
Classification
Writeup 30%
Target:
Microsoft Office (specific version unclear)
No auth needed
Prerequisites:
Victim interaction to open the malicious .docx file
nomisec
WRITEUP
4 stars
by fengjixuchui · poc
https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate
This repository provides a writeup on generating a malicious .docx file to exploit CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It describes the process of inserting a 'Bitmap Image' object to trigger the exploit.
Classification
Writeup 80%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
Microsoft Office Word installation · ability to deliver malicious .docx file to target
nomisec
WRITEUP
3 stars
by vysecurity · poc
https://github.com/vysecurity/CVE-2021-40444
The repository contains only a README.md file with minimal content, lacking any exploit code or technical details. It appears to be a placeholder or stub for CVE-2021-40444, a known Microsoft MSHTML Remote Code Execution vulnerability.
Classification
Writeup 90%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
nomisec
WORKING POC
3 stars
by bambooqj · client-side
https://github.com/bambooqj/CVE-2021-40444_EXP_JS
This exploit leverages CVE-2021-40444, a remote code execution vulnerability in Microsoft MSHTML via a malicious ActiveX control. It uses a series of HTML file manipulations and ActiveX object instantiations to trigger the vulnerability and execute arbitrary code.
Classification
Working Poc 90%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
Prerequisites:
Victim must visit a malicious webpage or open a malicious document
nomisec
WORKING POC
2 stars
by MRacumen · client-side
https://github.com/MRacumen/CVE-2021-40444
This repository contains a fully weaponized exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes a generator for malicious DOCX files that leverage a CAB file with a path traversal vulnerability to achieve arbitrary code execution via DLL side-loading.
Classification
Working Poc 95%
Target:
Microsoft Office Word (pre-patch versions)
No auth needed
Prerequisites:
Victim opens a malicious DOCX file · Microsoft Office Word with vulnerable version · Network access to attacker-controlled server for payload delivery
nomisec
WORKING POC
1 stars
by Zeop-CyberSec · client-side
https://github.com/Zeop-CyberSec/word_mshtml
This is a Metasploit auxiliary module that generates a malicious DOCX file exploiting CVE-2021-40444, a vulnerability in Microsoft Office's MSHTML engine. It crafts a malicious ActiveX control to achieve remote code execution when the document is opened.
Classification
Working Poc 95%
Target:
Microsoft Office Word (vulnerable versions)
No auth needed
Prerequisites:
Vulnerable version of Microsoft Office Word · Ability to deliver the malicious DOCX file to the target
nomisec
STUB
1 stars
by k4k4 · poc
https://github.com/k4k4/CVE-2021-40444-Sample
The repository contains only a README.md file with minimal information about CVE-2021-40444, lacking any exploit code or technical details. It appears to be a placeholder or stub without functional content.
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
gitlab
WORKING POC
by helsecert_pocs · poc
https://gitlab.com/helsecert_pocs/cve-2021-40444
This repository contains a proof-of-concept for CVE-2021-40444, including malicious document files (docx, RTF) and supporting files (HTML, CAB) designed to exploit the vulnerability. The README indicates these files can be used for testing detection and mitigation measures.
Classification
Working Poc 80%
Target:
Microsoft Office (MSHTML)
No auth needed
Prerequisites:
Victim interaction (opening malicious document) · Network access to deliver payload
nomisec
WORKING POC
by basim-ahmad · client-side
https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444
This repository contains a Python-based PoC for CVE-2021-40444, a Microsoft Office RCE vulnerability. It includes tools to parse and manipulate CAB files, generate malicious documents, and exploit the vulnerability via a logical bug.
Classification
Working Poc 95%
Target:
Microsoft Office (MSHTML)
No auth needed
Prerequisites:
Victim interaction to open a malicious document · Network access to a controlled server for payload delivery
nomisec
WORKING POC
by hqdat809 · client-side
https://github.com/hqdat809/CVE-2021-40444
This repository contains a functional PoC for CVE-2021-40444, a Microsoft Office Word RCE vulnerability. It generates a malicious docx file and hosts an exploit server to deliver a payload (e.g., a DLL) via a crafted CAB file.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
Python 3 · lcab · DLL payload · HTTP server
nomisec
WORKING POC
by lisinan988 · poc
https://github.com/lisinan988/CVE-2021-40444-exp
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It generates a malicious docx file and hosts an exploit server to deliver a payload (DLL) via a crafted CAB file.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
Python 3 · lcab · DLL payload · HTTP server
nomisec
WORKING POC
by Alexcot25051999 · poc
https://github.com/Alexcot25051999/CVE-2021-40444
This repository contains a functional proof-of-concept exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It generates a malicious docx file and hosts a server to deliver the payload, leveraging a patched CAB file and obfuscated HTML exploit.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
DLL payload (e.g., calc.dll) · Python 3 · lcab tool · HTTP server
nomisec
WORKING POC
by tiagob0b · poc
https://github.com/tiagob0b/CVE-2021-40444
This repository contains a fully weaponized exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes a generator for malicious DOCX files that leverage a CAB file with a ZipSlip vulnerability to achieve arbitrary code execution via DLL side-loading.
Classification
Working Poc 95%
Target:
Microsoft Office Word (pre-patch versions)
No auth needed
Prerequisites:
Victim opens a malicious DOCX file · Microsoft Office Word with vulnerable version · Network access to a controlled server hosting malicious files
nomisec
WORKING POC
by kal1gh0st · client-side
https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives
This PoC generates malicious CAB archives exploiting CVE-2021-40444 by embedding a modified DLL and crafting a CAB file with a patched header to trigger remote code execution via Microsoft MSHTML.
Classification
Working Poc 95%
Target:
Microsoft Windows (MSHTML Engine)
No auth needed
Prerequisites:
Windows OS with makecab utility · Victim interaction to open the malicious CAB file
nomisec
WORKING POC
by Jeromeyoung · poc
https://github.com/Jeromeyoung/TIC4301_Project
This repository provides a proof-of-concept exploit for CVE-2021-40444, a remote code execution vulnerability in Microsoft MSHTML. It includes instructions for setting up a vulnerable Windows 10 environment and a Kali Linux attacker machine, generating a malicious DLL, and delivering the exploit via a crafted document.
Classification
Working Poc 90%
Target:
Microsoft MSHTML (Internet Explorer)
No auth needed
Prerequisites:
Vagrant with Kali Linux and Windows 10 boxes · Metasploit for payload generation · Python 3 for exploit script
nomisec
WORKING POC
by metehangenel · poc
https://github.com/metehangenel/MSHTML-CVE-2021-40444
This repository contains a functional proof-of-concept exploit for CVE-2021-40444, a remote code execution vulnerability in Microsoft Office via MSHTML. It includes tools to generate malicious documents, deobfuscate exploit code, and compile a malicious DLL for payload delivery.
Classification
Working Poc 95%
Target:
Microsoft Office (MSHTML component)
No auth needed
Prerequisites:
Target must open a malicious Office document · Attacker must host a malicious CAB file and HTML exploit
nomisec
WORKING POC
by Phuong39 · poc
https://github.com/Phuong39/CVE-2021-40444-CAB
This PoC exploits CVE-2021-40444 by crafting malicious CAB files with embedded commands or DLLs. It uses MakeCAB to generate a CAB file with a patched header to trigger the vulnerability in Microsoft Windows.
Classification
Working Poc 90%
Target:
Microsoft Windows (via CAB file parsing)
No auth needed
Prerequisites:
Windows environment with MakeCAB utility · Ability to deliver malicious CAB file to target
nomisec
STUB
by Jeromeyoung · poc
https://github.com/Jeromeyoung/MSHTMHell
The repository contains only a README and a Python script with ASCII art, lacking any functional exploit code for CVE-2021-40444. It appears to be a placeholder or incomplete PoC.
Target:
Microsoft Office (CVE-2021-40444)
No auth needed
Prerequisites:
None identified due to lack of functional code
nomisec
WORKING POC
by Immersive-Labs-Sec · client-side
https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis
This is a deobfuscated exploit for CVE-2021-40444, a remote code execution vulnerability in Microsoft Office. The exploit leverages ActiveX objects and path traversal to execute malicious code via a crafted document.
Classification
Working Poc 95%
Target:
Microsoft Office (MSHTML Engine)
No auth needed
Prerequisites:
Victim must open a malicious Office document · Internet access to fetch payload
nomisec
WRITEUP
by jamesrep · poc
https://github.com/jamesrep/cve-2021-40444
This repository provides a detailed analysis of the CVE-2021-40444 exploit chain, including the malicious Word document and associated files. It explains the multi-stage attack involving OLE objects, ActiveX, and a malicious .cab file leading to code execution.
Classification
Writeup 90%
Target:
Microsoft Office (MSHTML Engine)
No auth needed
Prerequisites:
Victim opens malicious Word document · Internet access to download .cab file
nomisec
WORKING POC
by W1kyri3 · poc
https://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx
This repository contains a functional PoC for CVE-2021-40444, a Microsoft Office Word RCE vulnerability. It generates a malicious docx file and hosts an exploit server to deliver a payload (DLL) via a crafted CAB file.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
lcab installed · Python 3 · DLL payload (e.g., calc.dll)
nomisec
WRITEUP
by KnoooW · poc
https://github.com/KnoooW/CVE-2021-40444-docx-Generate
This repository provides a step-by-step guide to exploit CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability, by manipulating a .docx file's internal structure. It describes the process of embedding a malicious object and modifying XML relationships to trigger the exploit.
Classification
Writeup 90%
Target:
Microsoft Office Word (versions affected by CVE-2021-40444)
No auth needed
Prerequisites:
Ability to craft a malicious .docx file · Victim interaction to open the file
metasploit
WORKING POC
EXCELLENT
by lockedbyte, klezVirus, thesunRider, mekhalleh (RAMELLA Sébastien) · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/word_mshtml_rce.rb
This Metasploit module exploits CVE-2021-40444 by crafting a malicious DOCX file that leverages an ActiveX control to trigger remote code execution via the MSHTML engine in Microsoft Office Word. The exploit generates a CAB file with a manipulated checksum and hosts it via an HTTP server to deliver the payload.
Classification
Working Poc 95%
Target:
Microsoft Office Word (vulnerable versions)
No auth needed
Prerequisites:
Vulnerable Microsoft Office Word installation · User interaction to open the malicious DOCX file
patchapalooza
WORKING POC
by Moxin1044 · poc
https://gitee.com/Moxin1044/CVE-2021-40444
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes tools to generate malicious documents and a server to host the exploit payload.
Classification
Working Poc 95%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
DLL payload · HTTP server to host exploit files
patchapalooza
WORKING POC
by joecool0 · poc
https://gitee.com/joecool0/CVE-2021-40444
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes scripts to generate a malicious docx file and host an exploit server, leveraging a logical bug to execute arbitrary DLLs.
Classification
Working Poc 95%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
DLL payload · HTTP server to host exploit files
patchapalooza
WORKING POC
by xiaocainiao149 · poc
https://gitee.com/xiaocainiao149/CVE-2021-40444
This repository contains a fully weaponized exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes a malicious docx generator, CAB file manipulation tools, and detailed technical analysis of the exploit chain involving path traversal and DLL side-loading.
Classification
Working Poc 95%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
malicious DLL · CAB file manipulation · HTML file >= 4096 bytes
patchapalooza
WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-40444_1
This repository contains a fully weaponized exploit for CVE-2021-40444, a Microsoft Office Word RCE vulnerability. It includes a malicious docx generator, CAB file manipulation tools, and a detailed technical analysis of the exploit chain, including overlooked requirements like HTML size and CAB file byte-patching.
Classification
Working Poc 95%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
Malicious DLL file · Access to target's network to host malicious files
patchapalooza
WORKING POC
by zyjsuper · poc
https://gitee.com/zyjsuper/CVE-2021-40444
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes scripts to generate a malicious docx file and host an exploit server, leveraging a patched CAB file and obfuscated HTML to achieve arbitrary DLL execution.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
DLL payload · Python 3 · lcab utility · HTTP server
patchapalooza
SUSPICIOUS
by aydianosec · client-side
https://github.com/aydianosec/CVE2021-40444
The repository contains only a README with links to external resources (malware samples and other repos) but no actual exploit code or technical details. This is characteristic of a social engineering lure.
Classification
Suspicious 90%
Target:
Microsoft Office (CVE-2021-40444)
No auth needed
Prerequisites:
none provided
patchapalooza
WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-40444
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes tools to generate a malicious docx file and a server to host the exploit, leveraging a patched CAB file and obfuscated HTML to achieve arbitrary DLL execution.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
DLL payload · Python 3 · lcab utility · HTTP server
patchapalooza
WORKING POC
by evaltx · poc
https://gitee.com/evaltx/CVE-2021-40444
This repository contains a functional exploit for CVE-2021-40444, a Microsoft Office Word Remote Code Execution vulnerability. It includes scripts to generate a malicious docx file and host an exploit server, leveraging a patched CAB file and obfuscated HTML to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Office Word (2013-2021)
No auth needed
Prerequisites:
DLL payload · Python 3 · lcab tool · HTTP server