CVE-2024-11972
CRITICAL EXPLOITED NUCLEIHunk Companion WP <1.9.0 - Auth Bypass
Title source: llmDescription
The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.
Exploits (6)
nomisec
WORKING POC
1 stars
by NoxPenguin · poc
https://github.com/NoxPenguin/exploit-CVE-2024-11972
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-11972-PoC
exploitdb
WORKING POC
by Jun Takemura · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52259
Nuclei Templates (1)
Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation
CRITICALby s4e-io
FOFA:
body="/wp-content/plugins/hunk-companion/"
Scores
CVSS v3
9.8
EPSS
0.9125
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2024-12-10
Classification
Status
published
Affected Products (1)
themehunk/hunk_companion
< 1.9.0
Timeline
Published
Dec 31, 2024
Tracked Since
Feb 18, 2026