🔐 CVE Alert

CVE-2023-2745

MEDIUM 5.4

WordPress Core < 6.2.1 - Directory Traversal

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

CWE CWE-22
Vendor wordpress foundation
Product wordpress
Ecosystems
Industries
WebMedia
Published May 17, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wordpress foundation wordpress

Be the first to know when new medium vulnerabilities affecting wordpress foundation wordpress are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

WordPress Foundation / WordPress
0 < 4.1.38 4.2 < 4.2.35 4.3 < 4.3.31 4.4 < 4.4.30 4.5 < 4.5.29 4.6 < 4.6.26 4.7 < 4.7.26 4.8 < 4.8.22 4.9 < 4.9.23 5.0 < 5.0.19 5.1 < 5.1.16 5.2 < 5.2.18 5.3 < 5.3.15 5.4 < 5.4.13 5.5 < 5.5.12 5.6 < 5.6.11 5.7 < 5.7.9 5.8 < 5.8.7 5.9 < 5.9.6 6.0 < 6.0.4 6.1 < 6.1.2 6.2 < 6.2.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve wordpress.org: https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/ core.trac.wordpress.org: https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail= wordfence.com: https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/ exploit-db.com: https://www.exploit-db.com/exploits/52274 packetstormsecurity.com: http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html

Credits

Ramuel Gall Matt Rusnak