The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 13 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Iptanus
Iptanus wordpress File Upload
CPEs cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*
Vendors & Products Iptanus
Iptanus wordpress File Upload

Wed, 08 Jan 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Jan 2025 08:30:00 +0000

Type Values Removed Values Added
Description The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory.
Title WordPress File Upload <= 4.24.13 - Unauthenticated Path Traversal to Arbitrary File Read in wfu_file_downloader.php
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-01-08T14:06:34.771Z

Reserved: 2024-10-14T15:53:21.453Z

Link: CVE-2024-9939

cve-icon Vulnrichment

Updated: 2025-01-08T14:06:29.354Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-08T09:15:07.577

Modified: 2025-03-13T16:27:18.140

Link: CVE-2024-9939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.