5.3
CVSSv3

CVE-2022-2461

Published: 06/09/2022 Updated: 09/11/2023
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated malicious users to influence the data shown on the site.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

transposh transposh wordpress translation

Exploits

Transposh WordPress Translation versions 107 and below have an ajax action "tp_translation" which is available to authenticated or unauthenticated users (see CVE-2022-2461) that allows them to submit new translations Translations submitted this way are shown on the Transposh administrative interface on the pages "tp_main" and "tp_editor" Howeve ...