The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:*:*:* | |
Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
|
Metrics |
ssvc
|
Sat, 12 Oct 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. | |
Title | WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-12T06:51:11.974Z
Updated: 2024-10-15T15:10:53.008Z
Reserved: 2024-09-20T15:32:55.397Z
Link: CVE-2024-9047
Vulnrichment
Updated: 2024-10-15T15:10:46.604Z
NVD
Status : Awaiting Analysis
Published: 2024-10-12T07:15:02.170
Modified: 2024-10-15T12:57:46.880
Link: CVE-2024-9047
Redhat
No data.