Описание
The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.4 (исключая)
cpe:2.3:a:loco_translate_project:loco_translate:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 51%
0.00282
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
больше 3 лет назад
The Loco Translate WordPress plugin before 2.5.4 mishandles data inputs which get saved to a file, which can be renamed to an extension ending in .php, resulting in authenticated "translator" users being able to inject PHP code into files ending with .php in web accessible locations.
EPSS
Процентиль: 51%
0.00282
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-94