CVE-2022-3691: CWE-552 Files or Directories Accessible to External Parties in Unknown DeepL Pro API translation plugin
The DeepL Pro API translation plugin WordPress plugin before 1.7.5 discloses sensitive information (including the DeepL API key) in files that are publicly accessible to an external, unauthenticated visitor.
AI Analysis
Technical Summary
CVE-2022-3691 is a high-severity vulnerability affecting the DeepL Pro API translation plugin for WordPress, specifically versions prior to 1.7.5. The vulnerability is classified under CWE-552, which pertains to files or directories accessible to external parties that should not be publicly available. In this case, sensitive information including the DeepL API key is exposed through files that are publicly accessible without any authentication. This means that any unauthenticated external visitor can access these files and retrieve the API key. The API key is a critical credential that allows access to the DeepL Pro translation service, potentially enabling unauthorized use of the service, leading to financial loss or abuse of the API. The CVSS v3.1 score is 7.5, indicating a high severity due to the vulnerability being remotely exploitable over the network (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality (C:H) but not integrity or availability. The scope is unchanged (S:U), meaning the vulnerability affects the same security scope. Although no known exploits are reported in the wild, the ease of access to sensitive credentials makes this a significant risk. The plugin is used within WordPress environments, which are widely deployed across many organizations globally, including in Europe. The exposure of API keys can lead to unauthorized API calls, potential data leakage, and increased operational costs due to misuse. Since the vulnerability is due to improper file access controls, it reflects a misconfiguration or coding error in the plugin that fails to restrict access to sensitive files containing credentials.
Potential Impact
For European organizations using the DeepL Pro API translation plugin on their WordPress sites, this vulnerability poses a substantial risk. The exposure of API keys can lead to unauthorized usage of the DeepL translation service, resulting in unexpected charges and potential service disruption. Additionally, if attackers gain access to the API key, they might use it to infer or access other linked services or data, depending on how the API key is integrated within the organization's infrastructure. Confidentiality is directly impacted, as sensitive credentials are exposed publicly. This could also undermine trust in the organization's website security posture, especially for companies relying on multilingual content delivery. Given the widespread use of WordPress in Europe and the popularity of DeepL as a translation service (DeepL being a European company based in Germany), organizations in Europe are likely to use this plugin, increasing the potential impact. The vulnerability could also be exploited by competitors or malicious actors to disrupt business operations or to conduct further attacks leveraging the compromised API key.
Mitigation Recommendations
Organizations should immediately update the DeepL Pro API translation plugin to version 1.7.5 or later, where this vulnerability has been addressed. If updating is not immediately possible, administrators should manually verify and restrict access permissions to any files that may contain sensitive API keys, ensuring they are not publicly accessible via the web server. Implementing web server rules (e.g., .htaccess for Apache or equivalent for Nginx) to deny external access to configuration or credential files is critical. Additionally, organizations should rotate the exposed DeepL API keys to invalidate any potentially compromised credentials. Monitoring API usage for unusual activity can help detect unauthorized use early. As a longer-term measure, organizations should adopt the principle of least privilege for API keys, using keys with limited scopes and expiration where supported. Finally, conducting regular security audits of WordPress plugins and their configurations can help prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2022-3691: CWE-552 Files or Directories Accessible to External Parties in Unknown DeepL Pro API translation plugin
Description
The DeepL Pro API translation plugin WordPress plugin before 1.7.5 discloses sensitive information (including the DeepL API key) in files that are publicly accessible to an external, unauthenticated visitor.
AI-Powered Analysis
Technical Analysis
CVE-2022-3691 is a high-severity vulnerability affecting the DeepL Pro API translation plugin for WordPress, specifically versions prior to 1.7.5. The vulnerability is classified under CWE-552, which pertains to files or directories accessible to external parties that should not be publicly available. In this case, sensitive information including the DeepL API key is exposed through files that are publicly accessible without any authentication. This means that any unauthenticated external visitor can access these files and retrieve the API key. The API key is a critical credential that allows access to the DeepL Pro translation service, potentially enabling unauthorized use of the service, leading to financial loss or abuse of the API. The CVSS v3.1 score is 7.5, indicating a high severity due to the vulnerability being remotely exploitable over the network (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality (C:H) but not integrity or availability. The scope is unchanged (S:U), meaning the vulnerability affects the same security scope. Although no known exploits are reported in the wild, the ease of access to sensitive credentials makes this a significant risk. The plugin is used within WordPress environments, which are widely deployed across many organizations globally, including in Europe. The exposure of API keys can lead to unauthorized API calls, potential data leakage, and increased operational costs due to misuse. Since the vulnerability is due to improper file access controls, it reflects a misconfiguration or coding error in the plugin that fails to restrict access to sensitive files containing credentials.
Potential Impact
For European organizations using the DeepL Pro API translation plugin on their WordPress sites, this vulnerability poses a substantial risk. The exposure of API keys can lead to unauthorized usage of the DeepL translation service, resulting in unexpected charges and potential service disruption. Additionally, if attackers gain access to the API key, they might use it to infer or access other linked services or data, depending on how the API key is integrated within the organization's infrastructure. Confidentiality is directly impacted, as sensitive credentials are exposed publicly. This could also undermine trust in the organization's website security posture, especially for companies relying on multilingual content delivery. Given the widespread use of WordPress in Europe and the popularity of DeepL as a translation service (DeepL being a European company based in Germany), organizations in Europe are likely to use this plugin, increasing the potential impact. The vulnerability could also be exploited by competitors or malicious actors to disrupt business operations or to conduct further attacks leveraging the compromised API key.
Mitigation Recommendations
Organizations should immediately update the DeepL Pro API translation plugin to version 1.7.5 or later, where this vulnerability has been addressed. If updating is not immediately possible, administrators should manually verify and restrict access permissions to any files that may contain sensitive API keys, ensuring they are not publicly accessible via the web server. Implementing web server rules (e.g., .htaccess for Apache or equivalent for Nginx) to deny external access to configuration or credential files is critical. Additionally, organizations should rotate the exposed DeepL API keys to invalidate any potentially compromised credentials. Monitoring API usage for unusual activity can help detect unauthorized use early. As a longer-term measure, organizations should adopt the principle of least privilege for API keys, using keys with limited scopes and expiration where supported. Finally, conducting regular security audits of WordPress plugins and their configurations can help prevent similar issues.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-10-26T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbede9c
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 7/2/2025, 4:12:20 AM
Last updated: 8/12/2025, 9:15:35 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.