Files
CVEs-PoC/2021/CVE-2021-34630.md
2025-09-29 21:09:30 +02:00

18 lines
1.1 KiB
Markdown

### [CVE-2021-34630](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34630)
![](https://img.shields.io/static/v1?label=Product&message=GTranslate%20Pro%20and%20GTranslate%20Enterprise&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.8.65%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brightgreen)
### Description
In the Pro and Enterprise versions of GTranslate < 2.8.65, the gtranslate_request_uri_var function runs at the top of all pages and echoes out the contents of $_SERVER['REQUEST_URI']. Although this uses addslashes, and most modern browsers automatically URLencode requests, this plugin is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below, or in cases where an attacker is able to modify the request en route between the client and the server, or in cases where the user is using an atypical browsing solution.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates