Unauthenticated Attackers Can Read or Delete Files via Path Traversal Flaw in WordPress File Upload Plugin
CVE-2024-9047

9.8CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
12 October 2024

Badges

📈 Score: 221👾 Exploit Exists🟡 Public PoC

What is CVE-2024-9047?

CVE-2024-9047 is a critical vulnerability identified in the WordPress File Upload plugin developed by Nickboss. This plugin is commonly used to facilitate file uploads on WordPress websites. The vulnerability arises from a path traversal flaw that allows unauthenticated attackers to access and manipulate files outside the intended directory. This can severely compromise the security of an organization’s WordPress site, potentially leading to unauthorized file access or deletion.

Technical Details

The vulnerability exists in all versions of the WordPress File Upload plugin up to and including 4.24.11, specifically through the wfu_file_downloader.php file. Exploitation of this vulnerability is contingent upon the targeted WordPress host running PHP version 7.4 or earlier, which significantly amplifies the risk for sites using these configurations. With this flaw, attackers can construct requests that navigate through directories, breaching the access controls typically enforced by the application.

Potential Impact of CVE-2024-9047

  • Unauthorized Data Exposure: Attackers can view sensitive files that should not be accessible, potentially leading to data breaches and exposure of confidential information.

  • Data Manipulation or Deletion: The ability to delete files could disrupt business operations by removing critical documents, images, or media that are integral to the website's functionality.

  • Increased Vulnerability to Further Attacks: A successful exploitation of this vulnerability may serve as a foothold for attackers, allowing them to launch further malicious activities, such as installing malware or conducting phishing attacks on the compromised site.

Affected Version(s)

WordPress File Upload * <= 4.24.11

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Arkadiusz Hydzik
.