Vulnerabilities > CVE-2022-2461 - Missing Authorization vulnerability in Transposh Wordpress Translation
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
LOW Availability impact
NONE Summary
The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt
- https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt
- https://plugins.trac.wordpress.org/browser/transposh-translation-filter-for-wordpress/trunk/transposh.php?rev=2682425#L1989
- https://plugins.trac.wordpress.org/browser/transposh-translation-filter-for-wordpress/trunk/transposh.php?rev=2682425#L1989
- https://www.exploitalert.com/view-details.html?id=38891
- https://www.exploitalert.com/view-details.html?id=38891
- https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/
- https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/223373fc-9d78-47f0-b283-109f8e00b802?source=cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/223373fc-9d78-47f0-b283-109f8e00b802?source=cve
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2461
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2461