CVE-2024-49380
HIGH EXPLOITED NUCLEIPlenti <0.7.2 - RCE
Title source: llmDescription
Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.
Nuclei Templates (1)
Plenti < v0.7.2 - OS Command Injection
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:"Plenti"
Scores
CVSS v3
7.5
EPSS
0.6426
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
VulnCheck KEV
2025-11-29
CWE
CWE-78
CWE-74
Status
published
Products (2)
plenti/plenti
< 0.7.2
plentico/plenti
0 - 0.7.2Go
Published
Oct 25, 2024
Tracked Since
Feb 18, 2026