The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the tk0 parameter from the tp_translation AJAX action, leading to Stored Cross-Site Scripting, which will trigger in the admin dashboard of the plugin. The minimum role needed to perform such attack depends on the plugin "Who can translate ?" setting.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 | Exploit Third Party Advisory |
Configurations
History
25 Aug 2022, 00:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 - Exploit, Third Party Advisory |
22 Aug 2022, 16:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-22 15:15
Updated : 2024-02-04 22:51
NVD link : CVE-2021-24911
Mitre link : CVE-2021-24911
CVE.ORG link : CVE-2021-24911
JSON object : View
Products Affected
transposh
- transposh_wordpress_translation
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')