The Google Language Translator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in versions up to, and including, 6.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Specifically affects users with older browsers that lack proper URL encoding support.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gtranslate
Gtranslate google Language Translator |
|
CPEs | cpe:2.3:a:gtranslate:google_language_translator:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Gtranslate
Gtranslate google Language Translator |
Wed, 16 Oct 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Oct 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Google Language Translator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in versions up to, and including, 6.0.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Specifically affects users with older browsers that lack proper URL encoding support. | |
Title | Google Language Translator <= 6.0.9 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-16T12:58:35.587Z
Reserved: 2024-10-15T18:43:22.080Z
Link: CVE-2021-4452

Updated: 2024-10-16T12:58:21.257Z

Status : Analyzed
Published: 2024-10-16T08:15:04.160
Modified: 2024-10-30T20:57:03.520
Link: CVE-2021-4452

No data.