Show filters
38 Total Results
Displaying 21-30 of 38
Sort by:
Attacker Value
Unknown
CVE-2022-3141
Disclosure Date: September 19, 2022 (last updated October 08, 2023)
The Translate Multilingual sites WordPress plugin before 2.3.3 is vulnerable to an authenticated SQL injection. By adding a new language (via the settings page) containing specific special characters, the backticks in the SQL query can be surpassed and a time-based blind payload can be injected.
0
Attacker Value
Unknown
CVE-2022-34061
Disclosure Date: June 24, 2022 (last updated October 07, 2023)
The Catly-Translate package in PyPI v0.0.3 to v0.0.5 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
0
Attacker Value
Unknown
CVE-2022-0765
Disclosure Date: April 18, 2022 (last updated October 07, 2023)
The Loco Translate WordPress plugin before 2.6.1 does not properly remove inline events from elements in the source translation strings before outputting them in the editor in the plugin admin panel, allowing any user with access to the plugin (Translator and Administrator by default) to add arbitrary javascript payloads to the source strings leading to a stored cross-site scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2022-0770
Disclosure Date: March 28, 2022 (last updated October 07, 2023)
The Translate WordPress with GTranslate WordPress plugin before 2.9.9 does not have CSRF check in some files, and write debug data such as user's cookies in a publicly accessible file if a specific parameter is used when requesting them. Combining those two issues, an attacker could gain access to a logged in admin cookies by making them open a malicious link or page
0
Attacker Value
Unknown
CVE-2021-25103
Disclosure Date: February 07, 2022 (last updated October 07, 2023)
The Translate WordPress with GTranslate WordPress plugin before 2.9.7 does not sanitise and escape the body parameter in the url_addon/gtranslate-email.php file before outputting it back in the page, leading to a Reflected Cross-Site Scripting issue. Note: exploitation of the issue requires knowledge of the NONCE_SALT and NONCE_KEY
0
Attacker Value
Unknown
CVE-2021-24721
Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
0
Attacker Value
Unknown
CVE-2021-24610
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
The TranslatePress WordPress plugin before 2.0.9 does not implement a proper sanitisation on the translated strings. The 'trp_sanitize_string' function only removes script tag with a regex, still allowing other HTML tags and attributes to execute javascript, which could lead to authenticated Stored Cross-Site Scripting issues.
0
Attacker Value
Unknown
CVE-2021-40864
Disclosure Date: September 10, 2021 (last updated November 28, 2024)
The Translate plugin 6.1.x through 6.3.x before 6.3.0.72 for ONLYOFFICE Document Server lacks escape calls for the msg.data and text fields.
0
Attacker Value
Unknown
CVE-2021-34630
Disclosure Date: July 23, 2021 (last updated February 23, 2025)
In the Pro and Enterprise versions of GTranslate < 2.8.65, the gtranslate_request_uri_var function runs at the top of all pages and echoes out the contents of $_SERVER['REQUEST_URI']. Although this uses addslashes, and most modern browsers automatically URLencode requests, this plugin is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below, or in cases where an attacker is able to modify the request en route between the client and the server, or in cases where the user is using an atypical browsing solution.
0
Attacker Value
Unknown
CVE-2020-11930
Disclosure Date: April 20, 2020 (last updated February 21, 2025)
The GTranslate plugin before 2.8.52 for WordPress has Reflected XSS via a crafted link. This requires use of the hreflang tags feature within a sub-domain or sub-directory paid option.
0