Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-2745Path Traversal in Foundation Wordpress

CWE-22Path Traversal8 documents8 sources
Severity
6.1MEDIUMNVD
CNA5.4
EPSS
77.5%
top 1.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 17
Latest updateJan 30

Description

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages3 packages

NVDwordpress/wordpress4.24.2.35+21
CVEListV5wordpress_foundation/wordpress4.24.2.35+21
Debianwordpress/wordpress< 5.7.11+dfsg1-0+deb11u1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-xgqr-2mpj-w9qv: WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 62023-07-06
CVEList
WordPress Core < 6.2.1 - Directory Traversal2023-05-17
OSV
CVE-2023-2745: WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 62023-05-17

💥Exploits & PoCs

2
Exploit-DB
WordPress Core 6.2 - Directory Traversal2025-04-22
Nuclei
WordPress Core <=6.2 - Directory Traversal

📋Vendor Advisories

1
Debian
CVE-2023-2745: wordpress - WordPress Core is vulnerable to Directory Traversal in versions up to, and inclu...2023

📄Research Papers

1
arXiv
AEGIS: White-Box Attack Path Generation using LLMs and Training Effectiveness Evaluation for Large-Scale Cyber Defence Exercises2026-01-30