CVE-2024-7954

CRITICAL EXPLOITED NUCLEI

SPIP - RCE

Title source: llm

Description

The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.

Exploits (12)

nomisec WORKING POC 13 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-7954
nomisec WORKING POC 9 stars
by gh-ost00 · remote
https://github.com/gh-ost00/CVE-2024-7954-RCE
nomisec WORKING POC 6 stars
by bigb0x · remote
https://github.com/bigb0x/CVE-2024-7954
nomisec WORKING POC 5 stars
by TheCyberguy-17 · remote
https://github.com/TheCyberguy-17/RCE_CVE-2024-7954
nomisec WORKING POC 2 stars
by 0dayan0n · remote
https://github.com/0dayan0n/RCE_CVE-2024-7954-
nomisec WRITEUP 1 stars
by ShivanshKuntal · remote
https://github.com/ShivanshKuntal/Exploitation-of-a-Remote-Code-Execution-vulnerability--CVE-2024-7954-
nomisec WRITEUP
by zxj-hub · poc
https://github.com/zxj-hub/CVE-2024-7954POC
nomisec WORKING POC
by Arthikw3b · remote
https://github.com/Arthikw3b/RCE-CVE-2024-7954
nomisec WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2024-7954
metasploit WORKING POC EXCELLENT
by Valentin Lobstein, Laluka, Julien Voisin · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/spip_porte_plume_previsu_rce.rb

Nuclei Templates (1)

SPIP Porte Plume Plugin - Remote Code Execution
CRITICALby s4e-io
FOFA: app="SPIP"

Scores

CVSS v3 9.8
EPSS 0.9375
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-09-22

Classification

CWE
CWE-1286 CWE-95
Status draft

Timeline

Published Aug 23, 2024
Tracked Since Feb 18, 2026