WordPress Core 6.2 Unauth DT via wp_lang Param
CVE-2023-2745 Published on May 17, 2023

WordPress Core < 6.2.1 - Directory Traversal
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the wp_lang parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

NVD

Timeline

Disclosed

Weakness Type

What is a Directory traversal Vulnerability?

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE-2023-2745 has been classified to as a Directory traversal vulnerability or weakness.


Products Associated with CVE-2023-2745

Want to know whenever a new CVE is published for WordPress? stack.watch will email you.

 

Affected Versions

WordPress Foundation WordPress:

Exploit Probability

EPSS
79.45%
Percentile
99.08%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.