The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/012c5b64-ef76-4539-afd8-40f6c329ae88 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-11-14T00:00:00
Updated: 2022-11-14T00:00:00
Reserved: 2022-10-07T00:00:00
Link: CVE-2022-3415
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-14T15:15:48.597
Modified: 2022-11-16T19:01:32.140
Link: CVE-2022-3415
JSON object: View
Redhat Information
No data.
CWE