Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-2462 — Sensitive Information Exposure in Transposh Wordpress Translation
Severity
5.3MEDIUMNVD
CISA9.8
EPSS
6.0%
top 9.30%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 6
Latest updateSep 7
Description
The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.9.6. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages2 packages
Patches
🔴Vulnerability Details
2💥Exploits & PoCs
1Nuclei▶
WordPress Transposh <=1.0.8.1 - Information Disclosure