CVE-2022-2461
MEDIUM EXPLOITED NUCLEITransposh Wordpress Translation < 1.0.8.1 - Missing Authorization
Title source: ruleDescription
The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.9.6. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.
Nuclei Templates (1)
Transposh WordPress Translation <= 1.0.8 - Unauthenticated Settings Change
MEDIUMVERIFIEDby riteshs4hu
FOFA:
body="/wp-content/plugins/transposh-translation-filter-for-wordpress/"
References (6)
Scores
CVSS v3
5.3
EPSS
0.1785
EPSS Percentile
95.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
VulnCheck KEV
2022-07-25
CWE
CWE-862
Status
published
Products (2)
oferwald/Transposh WordPress Translation
< 1.0.9.6
transposh/transposh_wordpress_translation
< 1.0.8.1
Published
Sep 06, 2022
Tracked Since
Feb 18, 2026