{"vulnerability": "CVE-2024-9047", "sightings": [{"uuid": "2b8aa855-60a9-4bd4-8ea5-6c2625a7eff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "891cc9c8-e8e0-46b1-a5a4-abffd7a46c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}, {"uuid": "1338ff78-ce55-4240-b7f1-45765ba1529b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9596", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWordPress File Upload\u63d2\u4ef6\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\uff08CVE-2024-9047\uff09\u6279\u91cf\u68c0\u6d4b\u811a\u672c\nURL\uff1ahttps://github.com/iSee857/CVE-2024-9047-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-25T05:21:22.000000Z"}, {"uuid": "10d3a3f4-f142-4736-a182-e124b8b11558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/66", "content": "CVE-2024-9047: WordPress File Upload plugin for WordPress is vulnerable to a Path Traversal vulnerability in all versions up to, and including, 4.24.11 via the wfu_file_downloader.php...\nexploitfinder.com/dbexploit/expl\u2026", "creation_timestamp": "2025-01-27T12:29:59.000000Z"}, {"uuid": "3458f3f2-f8ff-43b9-812c-64977e1e673d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/kf7Ed9SrDY9KvY7rNf9hM9Wd5uwcA2SalZ2FvpmNVaFrFQc", "content": "", "creation_timestamp": "2025-01-27T21:47:41.000000Z"}, {"uuid": "7c6bd450-97a9-4e57-8cbd-ec9be58b7d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/F-fOrjgp3Mr3VOE2BBhgFMlAqu7uJ17avQ8Wad5LrkBGLSw", "content": "", "creation_timestamp": "2025-01-25T10:00:05.000000Z"}, {"uuid": "be74cb49-ea16-451b-85d1-27882602abda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://bsky.app/profile/kooteksec.bsky.social/post/3lqhsbnof2c22", "content": "", "creation_timestamp": "2025-05-31T12:56:38.570970Z"}, {"uuid": "048a9902-7b89-4fa2-afa9-38f2a8c2a68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/sU-jNaPMtLGhQJIUlK_Y1eVeodJiHQnKe9p9PX30oKjDADc", "content": "", "creation_timestamp": "2025-01-29T12:30:50.000000Z"}, {"uuid": "4e37e467-13c1-4636-897b-4b54f0f78a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/ZkTPOT1GvH5mV0SPbNZVNob6KUYJ6yPptqmU7-VzW4JW04A", "content": "", "creation_timestamp": "2025-03-16T22:00:07.000000Z"}, {"uuid": "67a39a0e-f234-4411-a76e-1cec2b8bd82b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "8fa1123e-fa5a-4615-8515-83658aaac48b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}, {"uuid": "5696c4e0-94bb-4045-bbde-41f73fd3b32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/cRCduug7pYTeO6xzAXJyOJRo3wROGUn_FAbtMmh2Ty8cTs0", "content": "", "creation_timestamp": "2025-11-01T09:00:05.000000Z"}, {"uuid": "ac96d88a-48d2-40df-91ea-6a6529268ce8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://t.me/cvedetector/7765", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9047 - Wordpress File Upload Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-9047 \nPublished : Oct. 12, 2024, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-12T10:18:00.000000Z"}, {"uuid": "fb448199-31cd-45b9-9949-14dd8c89fe8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://t.me/xeonthread/61", "content": "\ud83d\udd34 CVE-2024-9047\n\ud83d\udee1 wfu_file_downloader\n\ud83d\udc80 Reaction i will share", "creation_timestamp": "2024-12-29T05:07:27.000000Z"}]}