Input validation vulnerability in Transposh WordPress Translation 1.0.8.1

The Transposh plugin for WordPress is not secure in versions 1.0.8.1 and earlier. Attackers who have high-level access to the website can use this vulnerability to run malicious code on the website. This is done by changing the file extension to .php and updating settings so that the malicious code is run when the file is opened.

Detected in:

Transposh WordPress Translation open vulnerable versions: >= * <= 1.0.9.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.