6.1

CVE-2023-2745

WordPress Core < 6.2.1 - Directory Traversal

WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Mögliche Gegenmaßnahme
WordPress: Update to one of the following versions, or a newer patched version: 4.1.38, 4.2.35, 4.3.31, 4.4.30, 4.5.29, 4.6.26, 4.7.26, 4.8.22, 4.9.23, 5.0.19, 5.1.16, 5.2.18, 5.3.15, 5.4.13, 5.5.12, 5.6.11, 5.7.9, 5.8.7, 5.9.6, 6.0.4, 6.1.2, 6.2.1
Weitere Schwachstelleninformationen
SystemWordPress Core
Produkt WordPress
Version [*, 4.1.38)
Version [4.2, 4.2.35)
Version [4.3, 4.3.31)
Version [4.4, 4.4.30)
Version [4.5, 4.5.29)
Version [4.6, 4.6.26)
Version [4.7, 4.7.26)
Version [4.8, 4.8.22)
Version [4.9, 4.9.23)
Version [5.0, 5.0.19)
Version [5.1, 5.1.16)
Version [5.2, 5.2.18)
Version [5.3, 5.3.15)
Version [5.4, 5.4.13)
Version [5.5, 5.5.12)
Version [5.6, 5.6.11)
Version [5.7, 5.7.9)
Version [5.8, 5.8.7)
Version [5.9, 5.9.6)
Version [6.0, 6.0.4)
Version [6.1, 6.1.2)
Version [6.2, 6.2.1)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WordpressWordpress Version < 4.1.38
WordpressWordpress Version >= 4.2 < 4.2.35
WordpressWordpress Version >= 4.3 < 4.3.31
WordpressWordpress Version >= 4.4 < 4.4.30
WordpressWordpress Version >= 4.5 < 4.5.29
WordpressWordpress Version >= 4.6 < 4.6.26
WordpressWordpress Version >= 4.7 < 4.7.26
WordpressWordpress Version >= 4.8 < 4.8.22
WordpressWordpress Version >= 4.9 < 4.9.23
WordpressWordpress Version >= 5.0 < 5.0.19
WordpressWordpress Version >= 5.1 < 5.1.16
WordpressWordpress Version >= 5.2 < 5.2.18
WordpressWordpress Version >= 5.3 < 5.3.15
WordpressWordpress Version >= 5.4 < 5.4.13
WordpressWordpress Version >= 5.5 < 5.5.12
WordpressWordpress Version >= 5.6 < 5.6.11
WordpressWordpress Version >= 5.7 < 5.7.9
WordpressWordpress Version >= 5.8 < 5.8.7
WordpressWordpress Version >= 5.9 < 5.9.6
WordpressWordpress Version >= 6.0 < 6.0.4
WordpressWordpress Version >= 6.1 < 6.1.2
WordpressWordpress Version6.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 72.65% 0.987
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
security@wordfence.com 5.4 2.2 2.7
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.