mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
18 lines
1.0 KiB
Markdown
18 lines
1.0 KiB
Markdown
![]() |
### [CVE-2023-2745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2745)
|
|||
|

|
|||
|

|
|||
|
&color=brighgreen)
|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
- http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/hxlxmjxbbxs/CVE-2022-3590-WordPress-Vulnerability-Scanner
|
|||
|
|