CVE-2021-24911

The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the tk0 parameter from the tp_translation AJAX action, leading to Stored Cross-Site Scripting, which will trigger in the admin dashboard of the plugin. The minimum role needed to perform such attack depends on the plugin "Who can translate ?" setting.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:*

History

25 Aug 2022, 00:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:*
References (MISC) https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 - (MISC) https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 - Exploit, Third Party Advisory

22 Aug 2022, 16:35

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-22 15:15

Updated : 2024-02-04 22:51


NVD link : CVE-2021-24911

Mitre link : CVE-2021-24911

CVE.ORG link : CVE-2021-24911


JSON object : View

Products Affected

transposh

  • transposh_wordpress_translation
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')