// For flags

CVE-2022-25810

Transposh WordPress Translation <= 1.0.8 - Subscriber+ Unauthorised Calls

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Transposh WordPress Translation WordPress plugin through 1.0.8 exposes a couple of sensitive actions such has “tp_reset” under the Utilities tab (/wp-admin/admin.php?page=tp_utils), which can be used/executed as the lowest-privileged user. Basically all Utilities functionalities are vulnerable this way, which involves resetting configurations and backup/restore operations.

El plugin Transposh WordPress Translation de WordPress versiones hasta 1.0.8, expone un par de acciones confidenciales como "tp_reset" bajo la pestaña Utilities (/wp-admin/admin.php?page=tp_utils), que pueden ser usadas/ejecutadas como el usuario menos privilegiado. Básicamente todas las funcionalidades de Utilidades son vulnerables de esta manera, lo que implica restablecer configuraciones y operaciones de backup/restauración.

The Transposh WordPress Translation plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions called via AJAX actions in versions up to, and including, 1.0.8.1. This makes it possible for authenticated attackers with subscriber-level permissions and above to perform many administrative actions such as initiating new back-ups, modifying the plugin's settings, deleting duplicates, and more.

Transposh WordPress Translation versions 1.0.8.1 and below do not properly enforce authorization on functionalities available on the plugin's "Utilities" page leading to unauthorized access for all user roles, including "Subscriber".

*Credits: Julien Ahrens
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-23 CVE Reserved
  • 2022-07-22 CVE Published
  • 2024-03-14 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Transposh
Search vendor "Transposh"
Transposh Wordpress Translation
Search vendor "Transposh" for product "Transposh Wordpress Translation"
<= 1.0.8
Search vendor "Transposh" for product "Transposh Wordpress Translation" and version " <= 1.0.8"
wordpress
Affected