{"vulnerability": "cve-2024-9047", "sightings": [{"uuid": "1338ff78-ce55-4240-b7f1-45765ba1529b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9596", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWordPress File Upload\u63d2\u4ef6\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\uff08CVE-2024-9047\uff09\u6279\u91cf\u68c0\u6d4b\u811a\u672c\nURL\uff1ahttps://github.com/iSee857/CVE-2024-9047-PoC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-25T05:21:22.000000Z"}, {"uuid": "ac96d88a-48d2-40df-91ea-6a6529268ce8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://t.me/cvedetector/7765", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-9047 - Wordpress File Upload Path Traversal\", \n  \"Content\": \"CVE ID : CVE-2024-9047 \nPublished : Oct. 12, 2024, 7:15 a.m. | 38\u00a0minutes ago \nDescription : The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.11 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read or delete files outside of the originally intended directory. Successful exploitation requires the targeted WordPress installation to be using PHP 7.4 or earlier. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-12T10:18:00.000000Z"}, {"uuid": "048a9902-7b89-4fa2-afa9-38f2a8c2a68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/sU-jNaPMtLGhQJIUlK_Y1eVeodJiHQnKe9p9PX30oKjDADc", "content": "", "creation_timestamp": "2025-01-29T12:30:50.000000Z"}, {"uuid": "4e37e467-13c1-4636-897b-4b54f0f78a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/ZkTPOT1GvH5mV0SPbNZVNob6KUYJ6yPptqmU7-VzW4JW04A", "content": "", "creation_timestamp": "2025-03-16T22:00:07.000000Z"}, {"uuid": "be74cb49-ea16-451b-85d1-27882602abda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://bsky.app/profile/kooteksec.bsky.social/post/3lqhsbnof2c22", "content": "", "creation_timestamp": "2025-05-31T12:56:38.570970Z"}, {"uuid": "67a39a0e-f234-4411-a76e-1cec2b8bd82b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "10d3a3f4-f142-4736-a182-e124b8b11558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "https://t.me/cybersecplayground/66", "content": "CVE-2024-9047: WordPress File Upload plugin for WordPress is vulnerable to a Path Traversal vulnerability in all versions up to, and including, 4.24.11 via the wfu_file_downloader.php...\nexploitfinder.com/dbexploit/expl\u2026", "creation_timestamp": "2025-01-27T12:29:59.000000Z"}, {"uuid": "3458f3f2-f8ff-43b9-812c-64977e1e673d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/kf7Ed9SrDY9KvY7rNf9hM9Wd5uwcA2SalZ2FvpmNVaFrFQc", "content": "", "creation_timestamp": "2025-01-27T21:47:41.000000Z"}, {"uuid": "7c6bd450-97a9-4e57-8cbd-ec9be58b7d8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/F-fOrjgp3Mr3VOE2BBhgFMlAqu7uJ17avQ8Wad5LrkBGLSw", "content": "", "creation_timestamp": "2025-01-25T10:00:05.000000Z"}, {"uuid": "2b8aa855-60a9-4bd4-8ea5-6c2625a7eff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "891cc9c8-e8e0-46b1-a5a4-abffd7a46c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}, {"uuid": "8fa1123e-fa5a-4615-8515-83658aaac48b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "MISP/d0bda5d9-8cbc-4c6c-8803-a5e3150f9ec2", "content": "", "creation_timestamp": "2025-09-01T19:03:03.000000Z"}, {"uuid": "5696c4e0-94bb-4045-bbde-41f73fd3b32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "published-proof-of-concept", "source": "Telegram/cRCduug7pYTeO6xzAXJyOJRo3wROGUn_FAbtMmh2Ty8cTs0", "content": "", "creation_timestamp": "2025-11-01T09:00:05.000000Z"}, {"uuid": "fb448199-31cd-45b9-9949-14dd8c89fe8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-9047", "type": "seen", "source": "https://t.me/xeonthread/61", "content": "\ud83d\udd34 CVE-2024-9047\n\ud83d\udee1 wfu_file_downloader\n\ud83d\udc80 Reaction i will share", "creation_timestamp": "2024-12-29T05:07:27.000000Z"}]}