Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total8
Critical0
High2
Medium6
Reset
Showing 1-8 of 8 records
Threat Entry Updated 2024-11-21

CVE-2022-2462 - Transposh Wordpress Translation Plugin

The Transposh WordPress Translation plugin for WordPress is vulnerable to sensitive information disclosure to unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_history' AJAX action and insufficient restriction on the data returned in the response. This makes it possible for unauthenticated users to exfiltrate usernames of individuals who have translated text.

PLUGIN Transposh Wordpress Translation

CVE-2022-2462

MEDIUM CVSS 5.3 2022-09-06
Threat Entry Updated 2025-05-05

CVE-2022-2461 - Transposh Wordpress Translation Plugin

The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.

PLUGIN Transposh Wordpress Translation

CVE-2022-2461

MEDIUM CVSS 5.3 2022-09-06
Threat Entry Updated 2024-11-21

CVE-2022-25810 - Transposh Wordpress Translation Plugin

The Transposh WordPress Translation WordPress plugin through 1.0.8 exposes a couple of sensitive actions such has “tp_reset” under the Utilities tab (/wp-admin/admin.php?page=tp_utils), which can be used/executed as the lowest-privileged user. Basically all Utilities functionalities are vulnerable this way, which involves resetting configurations and backup/restore operations.

PLUGIN Transposh Wordpress Translation

CVE-2022-25810

MEDIUM CVSS 6.5 2022-08-22
Threat Entry Updated 2024-11-21

CVE-2021-24910 - Transposh Wordpress Translation Plugin

The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue

PLUGIN Transposh Wordpress Translation

CVE-2021-24910

MEDIUM CVSS 6.1 2022-08-22
Threat Entry Updated 2024-11-21

CVE-2021-24912 - Transposh Wordpress Translation Plugin

The Transposh WordPress Translation WordPress plugin before 1.0.8 does not have CSRF check in its tp_translation AJAX action, which could allow attackers to make authorised users add a translation. Given the lack of sanitisation in the tk0 parameter, this could lead to a Stored Cross-Site Scripting issue which will be executed in the context of a logged in admin

PLUGIN Transposh Wordpress Translation

CVE-2021-24912

MEDIUM CVSS 5.4 2022-08-22
Threat Entry Updated 2024-11-21

CVE-2021-24911 - Transposh Wordpress Translation Plugin

The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the tk0 parameter from the tp_translation AJAX action, leading to Stored Cross-Site Scripting, which will trigger in the admin dashboard of the plugin. The minimum role needed to perform such attack depends on the plugin "Who can translate ?" setting.

PLUGIN Transposh Wordpress Translation

CVE-2021-24911

MEDIUM CVSS 5.4 2022-08-22
Scroll to top