CVE-2024-9593

Scores

EPSS

0.842high84.2%
0%20%40%60%80%100%

Percentile: 84.2%

CVSS

8.3high3.x
0246810

CVSS Score: 8.3/10

All CVSS Scores

CVSS 3.x
8.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Description

The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the ‘etimeclockwp_load_function_callback’ function. This allows unauthenticated attackers to execute code on the server. The invoked function’s parameters cannot be specified.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-94

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-9593

Source: github-poc

URL: https://github.com/Nxploited/CVE-2024-9593-Exploit

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: time_clock

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:wpplugin:time_clock:*:*:*:*:pro:wordpress:*:*",      "versionEndIncluding": "1.1.4",      "vulnerable": true    },    {      "cpe23uri": "cpe...

Source: nvd

End of list