The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/bc7d4774-fce8-4b0b-8015-8ef4c5b02d38 - Exploit, Third Party Advisory |
Information
Published : 2021-11-08 18:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24721
Mitre link : CVE-2021-24721
CVE.ORG link : CVE-2021-24721
JSON object : View
Products Affected
loco_translate_project
- loco_translate
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')