Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-2461Missing Authorization in Transposh Wordpress Translation

Severity
5.3MEDIUMNVD
EPSS
17.8%
top 4.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 6
Latest updateSep 7

Description

The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.9.6. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3xc8-4p8r-q7hj: The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and2022-09-07
CVEList
Transposh WordPress Translation <= 1.0.9.6 - Unauthorized Settings Change2022-09-06
VulnCheck
transposh transposh_wordpress_translation Missing Authorization2022

💥Exploits & PoCs

1
Nuclei
Transposh WordPress Translation <= 1.0.8 - Unauthenticated Settings Change
CVE-2022-2461 — Missing Authorization | cvebase