CVE-2024-9707

CRITICAL EXPLOITED NUCLEI

Themehunk Hunk Companion < 1.8.5 - Missing Authorization

Title source: rule

Description

The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.

Exploits (4)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WordPress_Hunk_Companion(CVE-2024-9707).py
nomisec WORKING POC 1 stars
by RandomRobbieBF · remote
https://github.com/RandomRobbieBF/CVE-2024-9707
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-9707-Poc
nomisec WORKING POC
by Nxploited · remote
https://github.com/Nxploited/CVE-2024-9707-Poc

Nuclei Templates (1)

Hunk Companion <= 1.8.4 - Arbitrary Plugin Installation
CRITICALVERIFIEDby DhiyaneshDK
FOFA: body="/wp-content/plugins/hunk-companion/"

Scores

CVSS v3 9.8
EPSS 0.9030
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-10-11
CWE
CWE-862
Status published
Products (2)
themehunk/Hunk Companion < 1.8.4
themehunk/hunk_companion < 1.8.5
Published Oct 11, 2024
Tracked Since Feb 18, 2026