CVE-2024-9707
CRITICAL EXPLOITED NUCLEIThemehunk Hunk Companion < 1.8.5 - Missing Authorization
Title source: ruleDescription
The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
Exploits (4)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WordPress_Hunk_Companion(CVE-2024-9707).py
nomisec
WORKING POC
1 stars
by RandomRobbieBF · remote
https://github.com/RandomRobbieBF/CVE-2024-9707
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-9707-Poc
Nuclei Templates (1)
Hunk Companion <= 1.8.4 - Arbitrary Plugin Installation
CRITICALVERIFIEDby DhiyaneshDK
FOFA:
body="/wp-content/plugins/hunk-companion/"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9030
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-10-11
CWE
CWE-862
Status
published
Products (2)
themehunk/Hunk Companion
< 1.8.4
themehunk/hunk_companion
< 1.8.5
Published
Oct 11, 2024
Tracked Since
Feb 18, 2026