The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the tk0 parameter from the tp_translation AJAX action, leading to Stored Cross-Site Scripting, which will trigger in the admin dashboard of the plugin. The minimum role needed to perform such attack depends on the plugin "Who can translate ?" setting.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 - Exploit, Third Party Advisory |
Information
Published : 2022-08-22 15:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24911
Mitre link : CVE-2021-24911
CVE.ORG link : CVE-2021-24911
JSON object : View
Products Affected
transposh
- transposh_wordpress_translation
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')