First published: Mon Sep 27 2021(Updated: )
The TranslatePress WordPress plugin before 2.0.9 does not implement a proper sanitisation on the translated strings. The 'trp_sanitize_string' function only removes script tag with a regex, still allowing other HTML tags and attributes to execute javascript, which could lead to authenticated Stored Cross-Site Scripting issues.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
TranslatePress | <2.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24610 is a vulnerability in the TranslatePress WordPress plugin before version 2.0.9 that allows for the execution of JavaScript through unsanitized translated strings.
CVE-2021-24610 allows attackers to execute malicious JavaScript code on vulnerable TranslatePress WordPress installations, potentially leading to cross-site scripting (XSS) attacks.
CVE-2021-24610 has a severity rating of medium with a CVSS score of 4.8.
Attackers can exploit CVE-2021-24610 by injecting malicious JavaScript code into translated strings, which will be executed when viewed by authenticated users.
Yes, the vulnerability has been addressed in version 2.0.9 of the TranslatePress WordPress plugin, so updating to this version or later will fix the issue.