🔐 CVE Alert

CVE-2024-4885

CRITICAL 9.8 ⚠️ CISA KEV

WhatsUp Gold GetFileWithoutZip Directory Traversal Remote Code Execution Vulnerability

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

CWE CWE-22
Vendor progress software corporation
Product whatsup gold
Published Jun 25, 2024
Last Updated Oct 21, 2025
⚠️ Actively Exploited — Act Now

Get instant alerts for progress software corporation whatsup gold

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2024-4885.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Progress Software Corporation / WhatsUp Gold
2023.1.0 < 2023.1.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
progress.com: https://www.progress.com/network-monitoring community.progress.com: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4885

Credits

Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative