Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 12 Mar 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* |
Tue, 15 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
| CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
|
| Metrics |
ssvc
|
Sat, 12 Oct 2024 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. | |
| Title | WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-15T15:10:53.008Z
Reserved: 2024-09-20T15:32:55.397Z
Link: CVE-2024-9047
Updated: 2024-10-15T15:10:46.604Z
Status : Analyzed
Published: 2024-10-12T07:15:02.170
Modified: 2025-03-12T18:03:50.177
Link: CVE-2024-9047
No data.
OpenCVE Enrichment
No data.