5.4
CVE-2021-24912
- EPSS 0.21%
- Veröffentlicht 22.08.2022 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:53:59
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Transposh WordPress Translation <= 1.0.9.1 - Cross-Site Request Forgery
The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin
Mögliche Gegenmaßnahme
Transposh WordPress Translation: Update to version 1.0.9.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Transposh WordPress Translation
Version
*-1.0.9.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Transposh ≫ Transposh Wordpress Translation SwPlatformwordpress Version < 1.0.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.21% | 0.43 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.