CVE-2024-27954

WordPress Automatic plugin <= 3.92.0 - Unauthenticated Arbitrary File Download and SSRF vulnerability

Basic Information

CVE State
PUBLISHED
Reserved Date
February 28, 2024
Published Date
May 17, 2024
Last Updated
August 02, 2024
Vendor
WP Automatic
Product
Automatic
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.
Tags
wordpress nuclei_scanner

CVSS Scores

CVSS v3.1

9.3 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

EPSS Score

Score
93.27% (Percentile: 99.79%) as of 2025-05-22

SSVC Information

Exploitation
poc
Automatable
Yes
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (2025-05-05 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-04-24 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

gh-ost00/CVE-2024-27954

Type: github • Created: 2024-10-29 00:46:35 UTC • Stars: 4

Automatic Plugin for WordPress < 3.92.1 Multiples Vulnerabilities

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Detected by Nuclei