CVE-2024-9047
CRITICAL EXPLOITED NUCLEIIptanus Wordpress File Upload < 4.24.12 - Path Traversal
Title source: ruleDescription
The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier.
Exploits (7)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WordPress_FileUpload (CVE-2024-9047).py
nomisec
WORKING POC
7 stars
by verylazytech · infoleak
https://github.com/verylazytech/CVE-2024-9047
nomisec
WORKING POC
3 stars
by Nxploited · remote
https://github.com/Nxploited/CVE-2024-9047-Exploit
nomisec
WORKING POC
by amirqusairy99 · infoleak
https://github.com/amirqusairy99/WordPress-File-Upload-4.24.11---Unauthenticated-Path-Traversal
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2024-9047-Exploit
Nuclei Templates (1)
WordPress File Upload <= 4.24.11 - Arbitrary File Read
CRITICALby s4e-io,S9n3x
Shodan:
http.html:"/wp-content/plugins/wp-file-upload/"
FOFA:
body="/wp-content/plugins/wp-file-upload"
Scores
CVSS v3
9.8
EPSS
0.9362
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-05-27
Classification
CWE
CWE-22
Status
published
Affected Products (1)
iptanus/wordpress_file_upload
< 4.24.12
Timeline
Published
Oct 12, 2024
Tracked Since
Feb 18, 2026