The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-11-08 10:15
Updated : 2021-11-10 12:39
NVD link : CVE-2021-24721
Mitre link : CVE-2021-24721
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
loco_translate_project
- loco_translate