Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-2745

Опубликовано: 17 мая 2023
Источник: debian
EPSS Высокий

Описание

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed6.2.1+dfsg1-1package

Примечания

  • https://core.trac.wordpress.org/changeset?old=55765&new=55765

  • https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/

EPSS

Процентиль: 99%
0.71468
Высокий

Связанные уязвимости

CVSS3: 5.4
ubuntu
около 2 лет назад

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

CVSS3: 5.4
nvd
около 2 лет назад

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

CVSS3: 5.4
github
почти 2 года назад

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.

EPSS

Процентиль: 99%
0.71468
Высокий