The Theme and plugin translation for Polylang is vulnerable to authorization bypass in versions up to, and including, 3.2.16 due to missing capability checks in the process_polylang_theme_translation_wp_loaded() function. This makes it possible for unauthenticated attackers to update plugin and theme translation settings and to import translation strings.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2814605%40theme-translation-for-polylang%2Ftrunk&old=2812254%40theme-translation-for-polylang%2Ftrunk&sfp_email=&sfph_mail= - Patch, Third Party Advisory | |
References | () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4169 - Third Party Advisory |
01 Dec 2022, 23:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-862 | |
CPE | cpe:2.3:a:theme_and_plugin_translation_for_polylang_project:theme_and_plugin_translation_for_polylang:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2814605%40theme-translation-for-polylang%2Ftrunk&old=2812254%40theme-translation-for-polylang%2Ftrunk&sfp_email=&sfph_mail= - Patch, Third Party Advisory | |
References | (MISC) https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4169 - Third Party Advisory |
28 Nov 2022, 18:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-28 18:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4169
Mitre link : CVE-2022-4169
CVE.ORG link : CVE-2022-4169
JSON object : View
Products Affected
theme_and_plugin_translation_for_polylang_project
- theme_and_plugin_translation_for_polylang
CWE
CWE-862
Missing Authorization