### [CVE-2024-27956](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27956) ![](https://img.shields.io/static/v1?label=Product&message=Automatic&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) ### Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0day404/HV-2024-POC - https://github.com/12442RF/POC - https://github.com/7aRanchi/CVE-2024-27956-for-fscan - https://github.com/AboSteam/POPC - https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956 - https://github.com/AlienTec1908/Matrioshka_HackMyVM_Medium - https://github.com/CERTologists/EXPLOITING-CVE-2024-27956 - https://github.com/Cappricio-Securities/CVE-2024-27956 - https://github.com/DMW11525708/wiki - https://github.com/DoTTak/Research-WordPress-CVE - https://github.com/FoxyProxys/CVE-2024-27956 - https://github.com/Lern0n/Lernon-POC - https://github.com/Linxloop/fork_POC - https://github.com/NaInSec/CVE-LIST - https://github.com/Ostorlab/KEV - https://github.com/Professor6T9/WordPressAutoExploiter - https://github.com/TadashiJei/Valve-Press-CVE-2024-27956-RCE - https://github.com/ThatNotEasy/CVE-2024-27956 - https://github.com/W3BW/CVE-2024-27956-RCE-File-Package - https://github.com/WhosGa/MyWiki - https://github.com/X-Projetion/CVE-2024-27956-WORDPRESS-RCE-PLUGIN - https://github.com/Yuan08o/pocs - https://github.com/ZonghaoLi777/githubTrending - https://github.com/admin772/POC - https://github.com/adminlove520/pocWiki - https://github.com/adysec/POC - https://github.com/amessedad/autoexploitGPT - https://github.com/aneasystone/github-trending - https://github.com/cisp-pte/POC-20241008-sec-fork - https://github.com/cve-2024/CVE-2024-27956-RCE - https://github.com/devsec23/CVE-2024-27956 - https://github.com/diego-tella/CVE-2024-27956-RCE - https://github.com/eeeeeeeeee-code/POC - https://github.com/fireinrain/github-trending - https://github.com/greenberglinken/2023hvv_1 - https://github.com/iemotion/POC - https://github.com/itzheartzz/MASS-CVE-2024-27956 - https://github.com/johe123qwe/github-trending - https://github.com/k3ppf0r/CVE-2024-27956 - https://github.com/laoa1573/wy876 - https://github.com/m4nInTh3mIdDle/wordpress-CVE-2024-27956 - https://github.com/nancyariah4/CVE-2024-27956 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oLy0/Vulnerability - https://github.com/plzheheplztrying/cve_monitor - https://github.com/sampsonv/github-trending - https://github.com/tanjiti/sec_profile - https://github.com/truonghuuphuc/CVE-2024-27956 - https://github.com/truonghuuphuc/Poc - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC - https://github.com/wy876/wiki - https://github.com/zhaoxiaoha/github-trending