The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.
References
Link | Resource |
---|---|
https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/ | Exploit Third Party Advisory |
https://www.exploitalert.com/view-details.html?id=38891 | Exploit Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2461 | Third Party Advisory |
https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt | Exploit Third Party Advisory VDB Entry |
https://plugins.trac.wordpress.org/browser/transposh-translation-filter-for-wordpress/trunk/transposh.php?rev=2682425#L1989 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-09-06 11:15
Updated : 2022-09-09 10:16
NVD link : CVE-2022-2461
Mitre link : CVE-2022-2461
JSON object : View
CWE
CWE-862
Missing Authorization
Products Affected
transposh
- transposh_wordpress_translation