CVE-2021-24912

The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:*

History

25 Aug 2022, 00:29

Type Values Removed Values Added
CPE cpe:2.3:a:transposh:transposh_wordpress_translation:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References (MISC) https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d - (MISC) https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d - Exploit, Third Party Advisory

22 Aug 2022, 16:35

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-22 15:15

Updated : 2024-02-04 22:51


NVD link : CVE-2021-24912

Mitre link : CVE-2021-24912

CVE.ORG link : CVE-2021-24912


JSON object : View

Products Affected

transposh

  • transposh_wordpress_translation
CWE
CWE-352

Cross-Site Request Forgery (CSRF)

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')