CVE-2024-49380

HIGH EXPLOITED NUCLEI

Plenti <0.7.2 - RCE

Title source: llm

Description

Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.

Nuclei Templates (1)

Plenti < v0.7.2 - OS Command Injection
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: title:"Plenti"

Scores

CVSS v3 7.5
EPSS 0.6426
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

VulnCheck KEV 2025-11-29
CWE
CWE-78 CWE-74
Status published
Products (2)
plenti/plenti < 0.7.2
plentico/plenti 0 - 0.7.2Go
Published Oct 25, 2024
Tracked Since Feb 18, 2026