{"uuid": "ac96d88a-48d2-40df-91ea-6a6529268ce8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://t.me/cvedetector/7765", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9047 - Wordpress File Upload Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-9047 \nPublished : Oct. 12, 2024, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-12T10:18:00.000000Z"}