Description
The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.
Published: 2022-09-06
Score: 5.3 Medium
EPSS: 4.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-34723 The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.
History

Tue, 15 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Transposh Transposh Wordpress Translation
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-10-15T18:34:52.936Z

Reserved: 2022-07-18T00:00:00.000Z

Link: CVE-2022-2462

cve-icon Vulnrichment

Updated: 2024-08-03T00:39:07.647Z

cve-icon NVD

Status : Modified

Published: 2022-09-06T18:15:13.950

Modified: 2024-11-21T07:01:02.283

Link: CVE-2022-2462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses