Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50351 | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptanus
Iptanus wordpress File Upload |
|
| CPEs | cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Iptanus
Iptanus wordpress File Upload |
Wed, 08 Jan 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Jan 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WordPress File Upload plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.24.13 via wfu_file_downloader.php. This makes it possible for unauthenticated attackers to read files outside of the originally intended directory. | |
| Title | WordPress File Upload <= 4.24.13 - Unauthenticated Path Traversal to Arbitrary File Read in wfu_file_downloader.php | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:56:10.078Z
Reserved: 2024-10-14T15:53:21.453Z
Link: CVE-2024-9939
Updated: 2025-01-08T14:06:29.354Z
Status : Modified
Published: 2025-01-08T09:15:07.577
Modified: 2026-04-08T18:23:01.757
Link: CVE-2024-9939
No data.
OpenCVE Enrichment
No data.
EUVD