.. / CVE-2022-2462

Exploit for WordPress Transposh <=1.0.8.1 - Information Disclosure (CVE-2022-2462)

Description:

WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user’s login name as part of the user_login attribute. If an anonymous user submits the translation, the user’s IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.

Nuclei Template

View the template here CVE-2022-2462.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-2462.yaml
Copy

References:

https://github.com/oferwald/transposh
https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2462
https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/
https://nvd.nist.gov/vuln/detail/CVE-2022-2462