The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
History

Tue, 15 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Iptanus
Iptanus wordpress File Upload
CPEs cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:*:*:*
Vendors & Products Iptanus
Iptanus wordpress File Upload
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 12 Oct 2024 07:00:00 +0000

Type Values Removed Values Added
Description The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
Title WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-12T06:51:11.974Z

Updated: 2024-10-15T15:10:53.008Z

Reserved: 2024-09-20T15:32:55.397Z

Link: CVE-2024-9047

cve-icon Vulnrichment

Updated: 2024-10-15T15:10:46.604Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-12T07:15:02.170

Modified: 2024-10-15T12:57:46.880

Link: CVE-2024-9047

cve-icon Redhat

No data.