The vulnerability stems from two key issues in options handling: 1) Missing CSRF protection through wp_nonce verification in the options saving routine, allowing forged requests. 2) Inadequate sanitization of multiple wpglobus_option parameters (enabled_languages, more_languages, etc.) when storing them, enabling XSS payload injection. The combination of these flaws in the options persistence mechanism makes the __save_options method (or equivalent options handler) the primary vulnerable function. While exact function names aren't explicitly disclosed, WordPress plugin patterns and the vulnerability's nature strongly indicate the options handling method in the admin class as the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wpglobus/wpglobus | composer | <= 1.9.6 | 1.9.7 |
A Semantic Attack on Google Gemini - Read the Latest Research