CVE-2024-11972

CRITICAL EXPLOITED NUCLEI

Hunk Companion WP <1.9.0 - Auth Bypass

Title source: llm

Description

The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.

Exploits (6)

nomisec WORKING POC 1 stars
by NoxPenguin · poc
https://github.com/NoxPenguin/exploit-CVE-2024-11972
nomisec WORKING POC 1 stars
by RonF98 · remote
https://github.com/RonF98/CVE-2024-11972-POC
nomisec WORKING POC
by Nxploited · remote
https://github.com/Nxploited/CVE-2024-11972-PoC
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-11972-PoC
vulncheck_xdb WORKING POC
remote
https://github.com/JunTakemura/exploit-CVE-2024-11972
exploitdb WORKING POC
by Jun Takemura · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52259

Nuclei Templates (1)

Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation
CRITICALby s4e-io
FOFA: body="/wp-content/plugins/hunk-companion/"

Scores

CVSS v3 9.8
EPSS 0.9125
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-12-10

Classification

Status published

Affected Products (1)

themehunk/hunk_companion < 1.9.0

Timeline

Published Dec 31, 2024
Tracked Since Feb 18, 2026