Vulnerability Description
The Theme and plugin translation for Polylang is vulnerable to authorization bypass in versions up to, and including, 3.2.16 due to missing capability checks in the process_polylang_theme_translation_wp_loaded() function. This makes it possible for unauthenticated attackers to update plugin and theme translation settings and to import translation strings.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Theme And Plugin Translation For Polylang Project | Theme And Plugin Translation For Polylang | < 3.2.17 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&newPatchThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9f6a358a-333c-4eb7-914
- https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4169Third Party Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&newPatchThird Party Advisory
- https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4169Third Party Advisory
FAQ
What is CVE-2022-4169?
CVE-2022-4169 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Theme and plugin translation for Polylang is vulnerable to authorization bypass in versions up to, and including, 3.2.16 due to missing capability checks in the process_polylang_theme_translation_...
How severe is CVE-2022-4169?
CVE-2022-4169 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4169?
Check the references section above for vendor advisories and patch information. Affected products include: Theme And Plugin Translation For Polylang Project Theme And Plugin Translation For Polylang.