cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-4452,https://securityvulnerability.io/vulnerability/CVE-2021-4452,Google Language Translator Plugin Vulnerable to Reflected Cross-Site Scripting,"The Google Language Translator plugin for WordPress displays vulnerabilities that expose authenticated users to the risk of Reflected Cross-Site Scripting. This occurs through multiple parameters that lack sufficient sanitization and proper output escaping. Attackers can leverage this weakness to inject arbitrary web scripts that can be executed upon tricking a user into engaging with a crafted link. The issue is particularly concerning for users with older web browsers, which may not adequately handle URL encoding, amplifying the risk of successful exploitation.",Wordpress,Translate WordPress – Google Language Translator,5.4,MEDIUM,0.0006000000284984708,false,,false,false,false,,false,false,2024-10-16T07:31:51.635Z,0 CVE-2021-24594,https://securityvulnerability.io/vulnerability/CVE-2021-24594,Translate WordPress - Google Language Translator < 6.0.12 - Admin+ Stored Cross-Site Scripting,"The Translate WordPress – Google Language Translator WordPress plugin before 6.0.12 does not sanitise and escape some of its settings before outputting it in various pages, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.",Wordpress,Translate WordPress – Google Language Translator,4.8,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2021-11-08T17:34:45.000Z,0