Логотип exploitDog
bind:CVE-2024-9047
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-9047

Количество 3

Количество 3

nvd логотип

CVE-2024-9047

8 месяцев назад

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-wphm-3gx3-274q

8 месяцев назад

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2025-06681

8 месяцев назад

Уязвимость плагина File Upload системы управления содержимым сайта WordPress, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-9047

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

CVSS3: 9.8
92%
Критический
8 месяцев назад
github логотип
GHSA-wphm-3gx3-274q

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

CVSS3: 9.8
92%
Критический
8 месяцев назад
fstec логотип
BDU:2025-06681

Уязвимость плагина File Upload системы управления содержимым сайта WordPress, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных

CVSS3: 9.8
92%
Критический
8 месяцев назад

Уязвимостей на страницу