Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2023-2745 — Path Traversal in Foundation Wordpress
Severity
6.1MEDIUMNVD
CNA5.4
EPSS
77.5%
top 1.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 17
Latest updateJan 30
Description
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages3 packages
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
2Nuclei▶
WordPress Core <=6.2 - Directory Traversal
📋Vendor Advisories
1Debian▶
CVE-2023-2745: wordpress - WordPress Core is vulnerable to Directory Traversal in versions up to, and inclu...↗2023
📄Research Papers
1arXiv▶
AEGIS: White-Box Attack Path Generation using LLMs and Training Effectiveness Evaluation for Large-Scale Cyber Defence Exercises↗2026-01-30