{"api_version":"1","generated_at":"2026-04-22T23:31:47+00:00","cve":"CVE-2023-2745","urls":{"html":"https://cve.report/CVE-2023-2745","api":"https://cve.report/api/cve/CVE-2023-2745.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2745","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2745"},"summary":{"title":"WordPress Core < 6.2.1 - Directory Traversal","description":"WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2023-05-17 09:15:10","updated_at":"2026-04-08 19:18:19"},"problem_types":["CWE-22","CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Secondary","score":"6.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N","data":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"WordPress Core < 6.2.1 - Directory Traversal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=","name":"https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html","name":"https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[SECURITY] [DLA 3462-1] wordpress security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.exploit-db.com/exploits/52274","name":"https://www.exploit-db.com/exploits/52274","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/","name":"https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"],"title":"WordPress 6.2.1 Maintenance & Security Release – WordPress News","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html","name":"http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"WordPress Core 6.2 XSS / CSRF / Directory Traversal ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/","name":"https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/","refsource":"security@wordfence.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2745","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2745","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.1.38 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.2 4.2.35 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.3 4.3.31 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.4 4.4.30 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.5 4.5.29 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.6 4.6.26 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.7 4.7.26 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.8 4.8.22 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 4.9 4.9.23 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.0 5.0.19 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.1 5.1.16 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.2 5.2.18 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.3 5.3.15 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.4 5.4.13 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.5 5.5.12 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.6 5.6.11 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.7 5.7.9 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.8 5.8.7 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 5.9 5.9.6 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 6.0 6.0.4 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 6.1 6.1.2 semver","platforms":[]},{"source":"CNA","vendor":"WordPress Foundation","product":"WordPress","version":"affected 6.2 6.2.1 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2023-05-16T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Ramuel Gall","lang":"en"},{"source":"CNA","value":"Matt Rusnak","lang":"en"}],"nvd_cpes":[{"cve_year":"2023","cve_id":"2745","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wordpress","cpe5":"wordpress","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2745","qid":"154141","title":"WordPress Directory Traversal Vulnerability (CVE-2023-2745)"},{"cve":"CVE-2023-2745","qid":"6000064","title":"Debian Security Update for wordpress (DLA 3462-1)"},{"cve":"CVE-2023-2745","qid":"730803","title":"WordPress Prior to 6.2.1 Multiple Vulnerabilities"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-04-24T18:22:33.536Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://www.exploit-db.com/exploits/52274"},{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve"},{"tags":["x_transferred"],"url":"https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"},{"tags":["x_transferred"],"url":"https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail="},{"tags":["x_transferred"],"url":"http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html"},{"tags":["x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}},{"metrics":[{"other":{"content":{"id":"CVE-2023-2745","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-01-13T16:22:24.483760Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-01-13T16:49:16.213Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"WordPress","vendor":"WordPress Foundation","versions":[{"lessThan":"4.1.38","status":"affected","version":"0","versionType":"semver"},{"lessThan":"4.2.35","status":"affected","version":"4.2","versionType":"semver"},{"lessThan":"4.3.31","status":"affected","version":"4.3","versionType":"semver"},{"lessThan":"4.4.30","status":"affected","version":"4.4","versionType":"semver"},{"lessThan":"4.5.29","status":"affected","version":"4.5","versionType":"semver"},{"lessThan":"4.6.26","status":"affected","version":"4.6","versionType":"semver"},{"lessThan":"4.7.26","status":"affected","version":"4.7","versionType":"semver"},{"lessThan":"4.8.22","status":"affected","version":"4.8","versionType":"semver"},{"lessThan":"4.9.23","status":"affected","version":"4.9","versionType":"semver"},{"lessThan":"5.0.19","status":"affected","version":"5.0","versionType":"semver"},{"lessThan":"5.1.16","status":"affected","version":"5.1","versionType":"semver"},{"lessThan":"5.2.18","status":"affected","version":"5.2","versionType":"semver"},{"lessThan":"5.3.15","status":"affected","version":"5.3","versionType":"semver"},{"lessThan":"5.4.13","status":"affected","version":"5.4","versionType":"semver"},{"lessThan":"5.5.12","status":"affected","version":"5.5","versionType":"semver"},{"lessThan":"5.6.11","status":"affected","version":"5.6","versionType":"semver"},{"lessThan":"5.7.9","status":"affected","version":"5.7","versionType":"semver"},{"lessThan":"5.8.7","status":"affected","version":"5.8","versionType":"semver"},{"lessThan":"5.9.6","status":"affected","version":"5.9","versionType":"semver"},{"lessThan":"6.0.4","status":"affected","version":"6.0","versionType":"semver"},{"lessThan":"6.1.2","status":"affected","version":"6.1","versionType":"semver"},{"lessThan":"6.2.1","status":"affected","version":"6.2","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Ramuel Gall"},{"lang":"en","type":"finder","value":"Matt Rusnak"}],"descriptions":[{"lang":"en","value":"WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack."}],"metrics":[{"cvssV3_1":{"baseScore":5.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:31:40.202Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve"},{"url":"https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/"},{"url":"https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail="},{"url":"https://www.wordfence.com/blog/2023/05/wordpress-core-6-2-1-security-maintenance-release-what-you-need-to-know/"}],"timeline":[{"lang":"en","time":"2023-05-16T00:00:00.000Z","value":"Disclosed"}],"title":"WordPress Core < 6.2.1 - Directory Traversal"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2023-2745","datePublished":"2023-05-17T08:36:44.034Z","dateReserved":"2023-05-16T19:53:02.398Z","dateUpdated":"2026-04-08T17:31:40.202Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2023-05-17 09:15:10","lastModifiedDate":"2026-04-08 19:18:19","problem_types":["CWE-22","CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionEndExcluding":"4.1.38","matchCriteriaId":"72FEE686-296A-4EEF-8EC7-70F19B2ECC8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2","versionEndExcluding":"4.2.35","matchCriteriaId":"FE814729-9FD8-41E7-8AA5-F123A79833B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3","versionEndExcluding":"4.3.31","matchCriteriaId":"99259AB0-B175-402A-A186-C266EE088033"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"4.4.30","matchCriteriaId":"19A06A3E-A938-49B7-914A-F970198B583A"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.5","versionEndExcluding":"4.5.29","matchCriteriaId":"9CA38BB9-8B35-478E-9E39-319DF67C35CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.6","versionEndExcluding":"4.6.26","matchCriteriaId":"CCA4F837-593D-4AFD-9D1B-EF610FEC5FF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.7","versionEndExcluding":"4.7.26","matchCriteriaId":"3A4ADD5E-F7DF-4407-88F9-EA01E6F06527"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"4.8.22","matchCriteriaId":"0B5A5147-A542-4F16-9EBD-2038CAF052E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"4.9.23","matchCriteriaId":"79324121-3888-4546-B9C2-24086AED5DC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.0.19","matchCriteriaId":"F0EE2796-CF56-4ECA-B789-43A1F84D0584"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1","versionEndExcluding":"5.1.16","matchCriteriaId":"6518C0C4-8879-4E08-87A1-670AC86286B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.2.18","matchCriteriaId":"F0217196-8093-4802-887B-CB32D0269913"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.3.15","matchCriteriaId":"6A76E2C9-E081-46B3-9089-98C5EE1CBE88"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.4.13","matchCriteriaId":"8290086D-12BE-46E5-97E3-8616609C73A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.5.12","matchCriteriaId":"64A76DFC-7B9A-420F-B893-BCC2E82E0804"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6","versionEndExcluding":"5.6.11","matchCriteriaId":"A2D5BDD5-1808-4C63-8114-352A8D46E3B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.7.9","matchCriteriaId":"69562325-CEA6-478E-9938-FA173578F280"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.8","versionEndExcluding":"5.8.7","matchCriteriaId":"62FEB36C-296F-40FB-B061-05104C1355F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.9.6","matchCriteriaId":"4C9F371A-3573-4253-95B1-235B50414A69"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.0.4","matchCriteriaId":"80D8EF2C-5074-4655-A093-7B2715584219"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.1.2","matchCriteriaId":"77A2C30C-AFD4-4EE9-B7C8-7380A79BDE8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:wordpress:wordpress:6.2:*:*:*:*:*:*:*","matchCriteriaId":"FE62E493-0231-4BBE-BC6B-8A9F153C6B04"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2023","CveId":"2745","Ordinal":"1","Title":"WordPress Core < 6.2.1 - Directory Traversal","CVE":"CVE-2023-2745","Year":"2023"},"notes":[{"CveYear":"2023","CveId":"2745","Ordinal":"1","NoteData":"WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.","Type":"Description","Title":"WordPress Core < 6.2.1 - Directory Traversal"}]}}}