CVE-2023-2745
WordPress Core < 6.2.1 - Directory Traversal
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
| CWE | CWE-22 |
| Vendor | wordpress foundation |
| Product | wordpress |
| Ecosystems | |
| Industries | WebMedia |
| Published | May 17, 2023 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for wordpress foundation wordpress
Be the first to know when new medium vulnerabilities affecting wordpress foundation wordpress are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
WordPress Foundation / WordPress
0 < 4.1.38 4.2 < 4.2.35 4.3 < 4.3.31 4.4 < 4.4.30 4.5 < 4.5.29 4.6 < 4.6.26 4.7 < 4.7.26 4.8 < 4.8.22 4.9 < 4.9.23 5.0 < 5.0.19 5.1 < 5.1.16 5.2 < 5.2.18 5.3 < 5.3.15 5.4 < 5.4.13 5.5 < 5.5.12 5.6 < 5.6.11 5.7 < 5.7.9 5.8 < 5.8.7 5.9 < 5.9.6 6.0 < 6.0.4 6.1 < 6.1.2 6.2 < 6.2.1
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve wordpress.org: https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/ core.trac.wordpress.org: https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail= wordfence.com: https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/ exploit-db.com: https://www.exploit-db.com/exploits/52274 packetstormsecurity.com: http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
Credits
Ramuel Gall Matt Rusnak