// For flags

CVE-2022-3141

Translatepress Multilinugal < 2.3.3 - Admin+ SQLi

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Translate Multilingual sites WordPress plugin before 2.3.3 is vulnerable to an authenticated SQL injection. By adding a new language (via the settings page) containing specific special characters, the backticks in the SQL query can be surpassed and a time-based blind payload can be injected.

El plugin Translate Multilingual sites de WordPress versiones anteriores a 2.3.3, es vulnerable a una inyección SQL autenticada. Al añadir un nuevo idioma (por medio de la página de configuración) que contenga determinados caracteres especiales, pueden sobrepasarse las marcas de la consulta SQL y puede inyectarse una carga útil ciega basada en el tiempo

The Translate Multilingual sites WordPress plugin is vulnerable to an authenticated SQL injection in versions up to, and including, 2.3.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. By adding a new language (via the settings page) containing specific special characters, the backticks in the SQL query can be surpassed. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

WordPress Translatepress Multilingual plugin versions prior to 2.3.3 suffer from a remote SQL injection vulnerability.

*Credits: Elias Hohl
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-23 CVE Published
  • 2022-09-06 CVE Reserved
  • 2023-03-25 First Exploit
  • 2024-08-03 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cozmoslabs
Search vendor "Cozmoslabs"
Translatepress
Search vendor "Cozmoslabs" for product "Translatepress"
< 2.3.3
Search vendor "Cozmoslabs" for product "Translatepress" and version " < 2.3.3"
wordpress
Affected