Plugin Vulnerability Hub
Plugin 2 known issues Latest disclosed May 14, 2026

Smartcat Translator for WPML Vulnerabilities

Review known vulnerability records for the WordPress plugin Smartcat Translator for WPML (`smartcat-wpml`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2026-4683 and CVE-2025-9451, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
2
High or Critical
0
Patch Coverage
100%
Last Updated
May 14, 2026
Related Security Guides

Use these guides while reviewing Smartcat Translator for WPML fixes

Pair this plugin vulnerability hub with practical WordPress hardening, scanner, and patch workflow guidance.

Patch Decision Workflow

How to prioritize Smartcat Translator for WPML remediation

Use the hub as a decision layer before opening individual records: confirm whether the issue has a CVE, whether a fixed version exists, and whether the affected range overlaps production installs.

Search-Ready Records
2
1. Match the Package
Confirm the installed WordPress plugin slug is smartcat-wpml before acting on any CVE from this cluster.
2. Sort by Severity
Start with 0 high or critical records, then review medium and unrated findings with public references.
3. Check Patch Evidence
2 records include a patch path; verify compatibility before closing the finding.
4. Monitor Gaps
0 records still lack a listed fixed release, so keep this hub in the review queue.
Priority CVE Quick Links

Fast paths into Smartcat Translator for WPML CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
2
Tracked CVE Issue Type Affected Versions Fixed Version CVSS
CVE-2026-4683
Smartcat Translator for WPML <= 3.1.77 - Missing Authorization to Unauthenticated Pl...
Vulnerability Versions up to 3.1.77 3.1.78 CVSS 6.5
CVE-2025-9451
Smartcat Translator for WPML <= 3.1.72 - Authenticated (Author+) SQL Injection via o...
SQL Injection Versions up to 3.1.72 3.1.73 CVSS 6.5
Coverage Snapshot

What this page helps you verify fast

This hub clusters tracked records for Smartcat Translator for WPML so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
2 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 0 high severity findings.
Recent CVEs
CVE-2026-4683 and CVE-2025-9451
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Smartcat Translator for WPML

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2026-4683
CVE-2026-4683: Smartcat Translator for WPML <= 3.1.77 - Missing Authorization to Unauthenticated Plugin Settings Update

The Smartcat Translator for WPML plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'routeData' REST endpoint in all versions up to, and including, 3.1.77. This makes it possible for unauthenticated attackers to overwr...

Published
May 14, 2026
Patched Release
3.1.78
Affected Versions
Versions up to 3.1.77
Next Step
Update to 3.1.78 or newer if supported.
Plugin Medium Patched: Yes CVE-2025-9451
CVE-2025-9451: Smartcat Translator for WPML <= 3.1.72 - Authenticated (Author+) SQL Injection via orderby Parameter

The Smartcat Translator for WPML plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 3.1.72 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing...

Published
Sep 10, 2025
Patched Release
3.1.73
Affected Versions
Versions up to 3.1.72
Next Step
Update to 3.1.73 or newer if supported.