3 Jun 2024

Developer of Million+ Install WordPress Plugin Discloses Security Vulnerability Without Making Update Available

A lot of things can go wrong in trying to fix vulnerabilities in WordPress plugins, sometimes things go wrong in an intentional way. That is the case with a vulnerability in the 1+ million install WordPress plugin Loco Translate. A week ago, the developer submitted a change for the plugin that fixes a vulnerability in the plugin. What they didn’t do was to release a new version of the plugin so that those using the plugin can update to a fixed version. While sometimes developers forget to bump the version number of the plugin, causing that situation. Here the developer is making changes to the plugin publicly before releasing a new version. That isn’t a good idea for security vulnerabilities, since it is possible to monitor for security changes, as we do, and notice such a situation.

In the submission to fix the vulnerability, the developer wrote “Fixed a missing security check – thanks Nosa Shandy.” The referenced security check is a nonce check, which prevents cross-site request forgery (CSRF). CSRF would allow an attacker to cause someone else to take an action they didn’t intend to. The vulnerability being fixed allowed that to occur when changing or resetting the advanced configuration options of a plugin or theme translation bundle from the plugin. [Read more]

14 Oct 2021

Vulnerability Details: Authenticated Remote Code Execution (RCE) in Loco Translate

We don’t know why developers publicly publish details of security changes in their WordPress plugins before they are making them available to users, but that keeps happening. That has occurred with the plugin Loco Translate. The Subversion commit message for the latest changes to the plugin is:


[Read more]

29 Mar 2019

Vulnerability Details: Authenticated Arbitrary File Viewing in Loco Translate

A recent report by Ali S. Ahmad (S4R1N) claimed that there is a local file inclusion (LFI) vulnerability in Loco Translate. The report is not of great quality, but in looking into this we found that there is authenticated arbitrary file viewing vulnerability that is exploitable by users with the Translator role or “loco_admin” capability.


[Read more]