CVE-2024-9047

CRITICAL EXPLOITED NUCLEI

Iptanus Wordpress File Upload < 4.24.12 - Path Traversal

Title source: rule

Description

The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.

Exploits (7)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WordPress_FileUpload (CVE-2024-9047).py
nomisec WORKING POC 7 stars
by verylazytech · infoleak
https://github.com/verylazytech/CVE-2024-9047
nomisec WORKING POC 4 stars
by iSee857 · infoleak
https://github.com/iSee857/CVE-2024-9047-PoC
nomisec WORKING POC 3 stars
by Nxploited · remote
https://github.com/Nxploited/CVE-2024-9047-Exploit
nomisec WORKING POC
by amirqusairy99 · infoleak
https://github.com/amirqusairy99/WordPress-File-Upload-4.24.11---Unauthenticated-Path-Traversal
nomisec WRITEUP
by tpdlshdmlrkfmcla · poc
https://github.com/tpdlshdmlrkfmcla/CVE-2024-9047
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-9047-Exploit

Nuclei Templates (1)

WordPress File Upload <= 4.24.11 - Arbitrary File Read
CRITICALby s4e-io,S9n3x
Shodan: http.html:"/wp-content/plugins/wp-file-upload/"
FOFA: body="/wp-content/plugins/wp-file-upload"

Scores

CVSS v3 9.8
EPSS 0.9362
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-05-27

Classification

CWE
CWE-22
Status published

Affected Products (1)

iptanus/wordpress_file_upload < 4.24.12

Timeline

Published Oct 12, 2024
Tracked Since Feb 18, 2026