https://github.com/jenderal92/cve-2024-8856
This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.
https://github.com/jenderal92/cve-2024-8856
cve-2024-8856 cve-scanner plugin-vulnerability security-tools vulnerability wordpress wordpress-plugin-scanner wordpress-security wp-time-capsule
Last synced: about 1 month ago
JSON representation
This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856. It identifies plugin versions below 1.22.22 as vulnerable and logs results to vuln.txt. Simple and efficient, it helps security researchers and admins detect and address risks quickly.
- Host: GitHub
- URL: https://github.com/jenderal92/cve-2024-8856
- Owner: Jenderal92
- Created: 2024-11-21T04:01:27.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-11-21T04:41:25.000Z (6 months ago)
- Last Synced: 2025-04-15T01:52:04.047Z (about 1 month ago)
- Topics: cve-2024-8856, cve-scanner, plugin-vulnerability, security-tools, vulnerability, wordpress, wordpress-plugin-scanner, wordpress-security, wp-time-capsule
- Language: Python
- Homepage:
- Size: 9.77 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2024-8856
This tool scans WordPress websites for vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.
It identifies plugin versions below "1.22.22" as vulnerable and logs results to "vuln.txt".
Simple and efficient, it helps security researchers and admins detect and address risks quickly.## Features
- Scans a list of URLs to detect vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.
- Identifies plugin versions below 1.22.22 as vulnerable (e.g., 1.22.21, 1.22.20).
- Uses Python libraries such as "requests" to send HTTP requests and check for plugin versions.
- Supports multithreading to speed up the scanning process across multiple sites simultaneously.
- Displays scan results with the vulnerability status: vulnerable or not vulnerable based on the version.
- The found vulnerable sites are saved to a result file ("vuln.txt")
## Buy Coffee :
- Bitcoin $: 14nXhmRiQx5joCXFTdR8ydm3T8et7MFDXC
- Saweria $: https://saweria.co/Shin403
- Trakteer $: https://trakteer.id/shin403
- Buymeacoffee $: https://www.buymeacoffee.com/shin.code
- Ko-Fi $: https://ko-fi.com/shincode403

## How To Run?
- Download and install Python from the official Python website: https://www.python.org.
- Install the required modules using the command:
pip install requests
. - Run the script with:
python file.py
. - Provide a list of sites (e.g., url.txt) as input.
## Disclaimer !!!
I have written the disclaimer on the cover of Jenderal92. You can check it HERE !!!