WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WordPress Core < 6.2.1 - Directory Traversal | |
| References |
|
Thu, 24 Apr 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:31:40.202Z
Reserved: 2023-05-16T19:53:02.398Z
Link: CVE-2023-2745
Updated: 2025-04-24T18:22:33.536Z
Status : Modified
Published: 2023-05-17T09:15:10.303
Modified: 2026-04-08T19:18:19.083
Link: CVE-2023-2745
No data.