First published: Wed May 17 2023(Updated: )
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WordPress | <4.1.38 | |
WordPress WordPress | >=4.2<4.2.35 | |
WordPress WordPress | >=4.3<4.3.31 | |
WordPress WordPress | >=4.4<4.4.30 | |
WordPress WordPress | >=4.5<4.5.29 | |
WordPress WordPress | >=4.6<4.6.26 | |
WordPress WordPress | >=4.7<4.7.26 | |
WordPress WordPress | >=4.8<4.8.22 | |
WordPress WordPress | >=4.9<4.9.23 | |
WordPress WordPress | >=5.0<5.0.19 | |
WordPress WordPress | >=5.1<5.1.16 | |
WordPress WordPress | >=5.2<5.2.18 | |
WordPress WordPress | >=5.3<5.3.15 | |
WordPress WordPress | >=5.4<5.4.13 | |
WordPress WordPress | >=5.5<5.5.12 | |
WordPress WordPress | >=5.6<5.6.11 | |
WordPress WordPress | >=5.7<5.7.9 | |
WordPress WordPress | >=5.8<5.8.7 | |
WordPress WordPress | >=5.9<5.9.6 | |
WordPress WordPress | >=6.0<6.0.4 | |
WordPress WordPress | >=6.1<6.1.2 | |
WordPress WordPress | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2745.
The title of this vulnerability is 'WordPress Core is vulnerable to Directory Traversal in versions up to and including 6.2 via the ‘wp_lang’ parameter.'
The severity of CVE-2023-2745 is medium (5.4).
CVE-2023-2745 allows unauthenticated attackers to access and load arbitrary translation files in WordPress versions up to and including 6.2.
At the moment, there are no known fixes for CVE-2023-2745. It is recommended to update to a newer version of WordPress when a fix becomes available.