Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-2462Sensitive Information Exposure in Transposh Wordpress Translation

Severity
5.3MEDIUMNVD
CISA9.8
EPSS
6.0%
top 9.30%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 6
Latest updateSep 7

Description

The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.9.6. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-vr73-3j55-m4ww: The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to,2022-09-07
CVEList
Transposh WordPress Translation <= 1.0.9.6 - Sensitive Information Disclosure2022-09-06

💥Exploits & PoCs

1
Nuclei
WordPress Transposh <=1.0.8.1 - Information Disclosure

📋Vendor Advisories

1
CISA
Adobe Reader and Acrobat Universal 3D Memory Corruption Vulnerability2022-06-08
CVE-2022-2462 — Sensitive Information Exposure | cvebase