The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.
History

Tue, 15 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2022-09-06T17:18:57

Updated: 2024-10-15T18:34:52.936Z

Reserved: 2022-07-18T00:00:00

Link: CVE-2022-2462

cve-icon Vulnrichment

Updated: 2024-08-03T00:39:07.647Z

cve-icon NVD

Status : Modified

Published: 2022-09-06T18:15:13.950

Modified: 2024-11-21T07:01:02.283

Link: CVE-2022-2462

cve-icon Redhat

No data.