Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2745 PoC — WordPress Core < 6.2.1 - Directory Traversal

Source
Associated Vulnerability
Title:WordPress Core < 6.2.1 - Directory Traversal (CVE-2023-2745)
Description:WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
Description
cve-2023-2745
Readme
Как пользоваться
Сохраните файл как check_cve-2023-2745.py и дайте право на запуск:
chmod +x check_cve-2023-2745.py
Установите зависимость (один раз):
python3 -m pip install requests
Запуск:
python3 check_cve-2023-2745.py https://example.com
File Snapshot

[4.0K] /data/pocs/064a721ee6bf840cde7cf84aace52f823616e9ef ├── [2.4K] check_cve-2023-2745.py └── [ 326] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →