Share
## https://sploitus.com/exploit?id=8841CBFD-D4E0-56F4-ADC8-F57EA12074DD
# CVE-2024-8856

<p>This tool scans WordPress websites for vulnerabilities in the <b>WP Time Capsule</b> plugin related to <b>CVE-2024-8856</b>. 
It identifies plugin versions below "1.22.22" as vulnerable and logs results to "vuln.txt". 
Simple and efficient, it helps security researchers and admins detect and address risks quickly.</p>

## Features
<ul dir="auto">
<li>Scans a list of URLs to detect vulnerabilities in the WP Time Capsule plugin related to CVE-2024-8856.</li>
<li>Identifies plugin versions below <strong>1.22.22</strong> as vulnerable (e.g., 1.22.21, 1.22.20).</li>
<li>Uses Python libraries such as "requests" to send HTTP requests and check for plugin versions.</li>
<li>Supports multithreading to speed up the scanning process across multiple sites simultaneously.</li>
<li>Displays scan results with the vulnerability status: vulnerable or not vulnerable based on the version.</li>
<li>The found vulnerable sites are saved to a result file ("vuln.txt")</li>
</ul>

## Buy Coffee :
<ul dir="auto">
<li>Bitcoin $: 14nXhmRiQx5joCXFTdR8ydm3T8et7MFDXC</li>
<li>Saweria $: https://saweria.co/Shin403</li>
<li>Trakteer $: https://trakteer.id/shin403</li>
<li>Buymeacoffee $: https://www.buymeacoffee.com/shin.code</li>
<li>Ko-Fi $: https://ko-fi.com/shincode403</li>
</ul>

![Jenderal92 CVE-2024-8856](https://github.com/user-attachments/assets/39ae4cfb-fa89-4f8f-a80e-d7ec2534fce7)


## How To Run?
<ul dir="auto">
<li>Download and install Python from the official Python website: <a href="https://www.python.org">https://www.python.org</a>.</li>
<li>Install the required modules using the command: <code>pip install requests</code>.</li>
<li>Run the script with: <code>python file.py</code>.</li>
<li>Provide a list of sites (e.g., url.txt) as input.</li>
</ul>

## Disclaimer !!!

<p>I have written the disclaimer on the cover of Jenderal92. You can check it <a href="https://github.com/Jenderal92">HERE !!!</a></p>