CVE-2023-26469

CRITICAL EXPLOITED IN THE WILD NUCLEI

Jorani 1.0.0 - Path Traversal

Title source: llm

Description

In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.

Exploits (3)

nomisec WORKING POC 1 stars
by d0rb · remote
https://github.com/d0rb/CVE-2023-26469
nomisec WORKING POC
by Kairo-one · remote
https://github.com/Kairo-one/CVE-2023-26469-Jorani
metasploit WORKING POC EXCELLENT
by RIOUX Guilhem (jrjgjk) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/php/jorani_path_trav.rb

Nuclei Templates (1)

Jorani 1.0.0 - Remote Code Execution
CRITICALVERIFIEDby pussycat0x
Shodan: http.favicon.hash:-2032163853
FOFA: icon_hash=-2032163853

Scores

CVSS v3 9.8
EPSS 0.9266
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-09-18
InTheWild.io 2024-09-18
CWE
CWE-22
Status published
Products (1)
jorani/jorani 1.0.0
Published Aug 17, 2023
Tracked Since Feb 18, 2026