Search for vulnerabilities
Vulnerability details: VCID-gf7e-n6a8-2udc
Vulnerability ID VCID-gf7e-n6a8-2udc
Aliases CVE-2023-2745
Summary WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Status Published
Exploitability 2.0
Weighted Severity 4.9
Risk 9.8
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3.1 5.4 http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
ssvc Track http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
epss 0.68866 https://api.first.org/data/v1/epss?cve=CVE-2023-2745
cvssv3.1 5.4 https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
ssvc Track https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
cvssv3.1 5.4 https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
ssvc Track https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
cvssv3.1 5.4 https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
ssvc Track https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
cvssv3.1 5.4 https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
ssvc Track https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2023-2745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210
https://www.exploit-db.com/exploits/52274
1036296 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036296
changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail= https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:6.2:*:*:*:*:*:*:*
CVE-2023-2745 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/52274.py
CVE-2023-2745 https://nvd.nist.gov/vuln/detail/CVE-2023-2745
edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
msg00024.html https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
wordpress-6-2-1-maintenance-security-release https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
Data source Exploit-DB
Date added April 22, 2025
Description WordPress Core 6.2 - Directory Traversal
Ransomware campaign use Unknown
Source publication date April 22, 2025
Exploit type webapps
Platform php
Source update date April 22, 2025
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Found at http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/ Found at http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Found at https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/ Found at https://core.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=55765%40%2F&new=55765%40%2F&sfp_email=&sfph_mail=
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/ Found at https://lists.debian.org/debian-lts-announce/2023/06/msg00024.html
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Found at https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/ Found at https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Found at https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-13T16:22:24Z/ Found at https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
Exploit Prediction Scoring System (EPSS)
Percentile 0.98552
EPSS Score 0.68866
Published At July 31, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:43:45.777143+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2023/2xxx/CVE-2023-2745.json 37.0.0