The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the tk0 parameter from the tp_translation AJAX action, leading to Stored Cross-Site Scripting, which will trigger in the admin dashboard of the plugin. The minimum role needed to perform such attack depends on the plugin "Who can translate ?" setting.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/bd88be21-0cfc-46bd-b78a-23efc4868a55 - Exploit, Third Party Advisory |
Information
Published : 2022-08-22 15:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24911
Mitre link : CVE-2021-24911
CVE.ORG link : CVE-2021-24911
JSON object : View
Products Affected
transposh
- transposh_wordpress_translation
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
