The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/349483e2-3ab5-4573-bc03-b1ebab40584d - Exploit, Third Party Advisory |
Information
Published : 2022-08-22 15:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24912
Mitre link : CVE-2021-24912
CVE.ORG link : CVE-2021-24912
JSON object : View
Products Affected
transposh
- transposh_wordpress_translation