The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d | Exploit Third Party Advisory |
Configurations
History
25 Aug 2022, 00:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | (MISC) https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d - Exploit, Third Party Advisory |
22 Aug 2022, 16:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-22 15:15
Updated : 2024-02-04 22:51
NVD link : CVE-2021-24912
Mitre link : CVE-2021-24912
CVE.ORG link : CVE-2021-24912
JSON object : View
Products Affected
transposh
- transposh_wordpress_translation