Vulnerability Details: Authenticated Arbitrary File Viewing in Loco Translate
A recent report by Ali S. Ahmad (S4R1N) claimed that there is a local file inclusion (LFI) vulnerability in Loco Translate. The report is not of great quality, but in looking into this we found that there is authenticated arbitrary file viewing vulnerability that is exploitable by users with the Translator role or “loco_admin” capability.
...
This post provides insights on a vulnerability in the WordPress plugin Loco Translate not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.
If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.
For existing customers, please log in to your account to view the rest of the contents of the post.
Plugin Security Scorecard Grade for Loco Translate
Checked on August 10, 2024B+