The DeepL Pro API translation plugin WordPress plugin before 1.7.5 discloses sensitive information (including the DeepL API key) in files that are publicly accessible to an external, unauthenticated visitor.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560 | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560 - Exploit, Third Party Advisory |
07 Nov 2023, 03:51
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
Information
Published : 2022-11-21 11:15
Updated : 2025-04-30 16:15
NVD link : CVE-2022-3691
Mitre link : CVE-2022-3691
CVE.ORG link : CVE-2022-3691
JSON object : View
Products Affected
fluenx
- deepl_pro_api_translation
CWE
CWE-552
Files or Directories Accessible to External Parties
