CVE-2023-2745

Source
https://cve.org/CVERecord?id=CVE-2023-2745
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2745.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-2745
Aliases
Downstream
Published
2023-05-17T09:15:10.303Z
Modified
2026-02-05T08:51:38.737718Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

References

Affected packages

Git / github.com/wordpress/wordpress

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress
Events
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2745.json"

Git / github.com/wordpress/wordpress-develop

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress-develop
Events
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed
Introduced
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2745.json"