The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Mar 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* |
Tue, 15 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:*:*:* | |
Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
|
Metrics |
ssvc
|
Sat, 12 Oct 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. | |
Title | WordPress File Upload <= 4.24.11 - Unauthenticated Path Traversal to Arbitrary File Read and Deletion in wfu_file_downloader.php | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-12T06:51:11.974Z
Updated: 2024-10-15T15:10:53.008Z
Reserved: 2024-09-20T15:32:55.397Z
Link: CVE-2024-9047

Updated: 2024-10-15T15:10:46.604Z

Status : Analyzed
Published: 2024-10-12T07:15:02.170
Modified: 2025-03-12T18:03:50.177
Link: CVE-2024-9047

No data.