CVE-2021-34630

GTranslate Pro and GTranslate Enterprise <= 2.8.64 - Reflected Cross-Site Scripting

mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
5.8
CVSS Score
5.8
CVSS Score
medium
Severity
2.8.65
Patched in
913d
Time to patch

Description

In the Pro and Enterprise versions of GTranslate < 2.8.65, the gtranslate_request_uri_var function runs at the top of all pages and echoes out the contents of $_SERVER['REQUEST_URI']. Although this uses addslashes, and most modern browsers automatically URLencode requests, this plugin is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below, or in cases where an attacker is able to modify the request en route between the client and the server, or in cases where the user is using an atypical browsing solution.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Low
Confidentiality
Low
Integrity
Low
Availability

Technical Details

Affected versions<2.8.65
PublishedJuly 23, 2021
Last updatedJanuary 22, 2024
Affected plugingtranslate

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.