Cookie Consent by Free Privacy Policy Generator website CVE-2022-25810 | Transposh Translation Plugin up to 1.0.8 on WordPress admin.php tp_reset authorization u

Portal Nachrichten

WIRKLICH FIXED: RSS feeds abonnieren!!!


➠ CVE-2022-25810 | Transposh Translation Plugin up to 1.0.8 on WordPress admin.php tp_reset authorization

A vulnerability classified as problematic has been found in Transposh Translation Plugin up to 1.0.8. This affects the function tp_reset of the file /wp-admin/admin.php?page=tp_utils. The manipulation leads to missing authorization. This vulnerability is uniquely identified as CVE-2022-25810. Access to the local network is required for this attack. There is no exploit available....


➦ Sicherheitslücken / Exploits ☆ vuldb.com

➠ Komplette Nachricht lesen


Zur Startseite

➤ Ähnliche Beiträge für 'CVE-2022-25810 | Transposh Translation Plugin up to 1.0.8 on WordPress admin.php tp_reset authorization'

Stored XSS and information exposure via wp-mail.php

vom 1700.42 Punkte
User authentication is not properly checked when the WordPress mail is run to prevent stored XSS. Additionally, adding email addresses from post-by-email logs are creating potential for information exposure vulnerability. This vulnerability affects t

Open redirect in wp_nonce_ays

vom 1699.55 Punkte
The WordPress HTTP referer is not properly validated when a user is redirected. This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7

CSRF in wp-trackback.php

vom 1697.25 Punkte
Missing authentication settings can lead to CSRF attacks This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7 WordPress 3.7.

Stored XSS via comment editing

vom 1696.38 Punkte
Missing adequate checks during comment editing can lead to stored XSS attacks. This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7

Leak in content from multipart emails and reverting shared objects for current user

vom 1696.38 Punkte
Reset PHPMailer properties between use to prevent information disclosure and revert shared objects for the current user to also prevent information disclosure This vulnerability affects the following application versions: WordPress 3.6

SQL injection within the link API

vom 1620.28 Punkte
The link API in the bookmark is not properly checked against an SQL injection. This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7

XSS vulnerability on the plugins screen

vom 1620.28 Punkte
The plugins screen is not properly escaped to prevent an XSS attack. This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7 WordPress 3.7.

Output escaping issue within the_meta()

vom 1620.28 Punkte
A variable in the_meta() function is not properly escaped to prevent an XSS attack. This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7

Object injection in some multisite installations

vom 1464.91 Punkte
The multisite installation of WordPress is not properly sanitized to prevent object injection via the upgrade process. This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1

SQL injection vulnerability in WP_Query

vom 1461.74 Punkte
Missing sanitization can lead to SQL injection in WP_Tax_Query This vulnerability affects the following application versions: WordPress 3.6 WordPress 3.6.1 WordPress 3.7 WordPress 3.7.

[CVE-2020-36326 - CVE-2018-19296] Object injection in PHPMailer

vom 1345.19 Punkte
CVE-2020-36326 - An external file could be unexpectedly executable if it was used as a path to an attachment file via PHP's support for .phar files`. Exploitation requires that an attacker was able to provide an unfiltered path to a file to attach. CVE-2018-19296 - Was vuln

3 Security improvements XML-RPC

vom 1217.59 Punkte
[XML-RPC] Improve error messages for unprivileged users Add specific permission checks to avoid ambiguous failure messages. [XML-RPC] Fix length validation of anonymous commenter's email address Fix the first step of validating an anonymous commente

Team Security Diskussion über CVE-2022-25810 | Transposh Translation Plugin up to 1.0.8 on WordPress admin.php tp_reset authorization