Impact
The Translate This gTranslate Shortcode plugin for WordPress is affected by a stored cross‑site scripting flaw that allows authenticated users with Contributor or higher privileges to inject arbitrary JavaScript via the 'base_lang' parameter. The injected script is stored and executed whenever any user views a page containing the malicious content. This can lead to cookie theft, session hijacking, defacement or unintended navigation, compromising confidentiality, integrity, and potentially usability of the site. The weakness is rooted in insufficient input sanitization and output escaping, classified as CWE‑79.
Affected Systems
All installations of the Translate This gTranslate Shortcode plugin version 1.0 and earlier. The vulnerability exists in the plugin's base_lang handling across its versions up to 1.0. Site owners using WordPress who have installed or are running the plugin should verify their version and upgrade immediately if on or below 1.0.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity, yet the low EPSS score (<1%) suggests that exploit activity is currently rare. Because the flaw requires authenticated access with at least Contributor rights, an attacker must first compromise or gain such a role on the WordPress site. Once the malicious code is injected, it persists across sessions and affects all subsequent visitors. Although the vulnerability is not listed in the CISA KEV catalog, sites remain at risk if the plugin is not updated.
OpenCVE Enrichment
EUVD