The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt | Exploit Third Party Advisory VDB Entry |
https://plugins.trac.wordpress.org/browser/transposh-translation-filter-for-wordpress/trunk/transposh.php?rev=2682425#L1948 | Patch Third Party Advisory |
https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/ | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/bd1f12ac-86ac-4be9-9575-98381c3b4291?source=cve | |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2462 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-09-06T17:18:57
Updated: 2024-01-11T08:32:55.069Z
Reserved: 2022-07-18T00:00:00
Link: CVE-2022-2462
JSON object: View
NVD Information
Status : Modified
Published: 2022-09-06T18:15:13.950
Modified: 2024-01-11T09:15:45.140
Link: CVE-2022-2462
JSON object: View
Redhat Information
No data.
CWE