Unauthorized Setting Changes in Transposh WordPress Translation Plugin
CVE-2022-2536

7.5HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
15 December 2022

Summary

The Transposh WordPress Translation plugin is impacted by a vulnerability that allows unauthenticated users to modify site settings unchecked. This occurs due to inadequate validation on the 'tp_translation' AJAX action. Attackers can exploit this weakness to override the 'Who can translate' option, particularly when the plugin's auto-translate feature is enabled by default. This security flaw enables unauthorized manipulation of displayed data, raising significant concerns for the integrity of WordPress websites using the plugin.

Affected Version(s)

Transposh WordPress Translation * <= 1.0.8.1

References

EPSS Score

7% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Julien Ahrens
.