CVE-2024-8856

CRITICAL EXPLOITED NUCLEI LAB

WordPress WP Time Capsule Arbitrary File Upload to RCE

Title source: metasploit

Description

The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Exploits (5)

exploitdb WORKING POC
by Al Baradi Joy · pythonwebappsphp
https://www.exploit-db.com/exploits/52131
nomisec WORKING POC 2 stars
by ubaydev · remote
https://github.com/ubaydev/CVE-2024-8856
nomisec SCANNER 1 stars
by Jenderal92 · poc
https://github.com/Jenderal92/CVE-2024-8856
nomisec WORKING POC
by Evillm · poc
https://github.com/Evillm/CVE-2024-8856-PoC
metasploit WORKING POC EXCELLENT
by Valentin Lobstein, Rein Daelman · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_time_capsule_file_upload_rce.rb

Nuclei Templates (1)

WP Time Capsule Plugin - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
FOFA: body="/wp-content/plugins/wp-time-capsule/"

Scores

CVSS v3 9.8
EPSS 0.9304
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-03-19
CWE
CWE-434
Status published
Products (2)
revmakx/Backup and Staging by WP Time Capsule < 1.22.21
revmakx/backup_and_staging_by_wp_time_capsule < 1.22.22
Published Nov 16, 2024
Tracked Since Feb 18, 2026