CVE-2023-26469
CRITICAL EXPLOITED IN THE WILD NUCLEIJorani 1.0.0 - Path Traversal
Title source: llmDescription
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by RIOUX Guilhem (jrjgjk) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/php/jorani_path_trav.rb
Nuclei Templates (1)
Jorani 1.0.0 - Remote Code Execution
CRITICALVERIFIEDby pussycat0x
Shodan:
http.favicon.hash:-2032163853
FOFA:
icon_hash=-2032163853
Scores
CVSS v3
9.8
EPSS
0.9266
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-09-18
InTheWild.io
2024-09-18
CWE
CWE-22
Status
published
Products (1)
jorani/jorani
1.0.0
Published
Aug 17, 2023
Tracked Since
Feb 18, 2026