The Chat Bubble – Floating Chat with Contact Chat Icons, Messages, Telegram, Email, SMS, Call me back plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/chat-bubble/ | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve | Third Party Advisory |
https://wordpress.org/plugins/chat-bubble/ | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve | Third Party Advisory |
Configurations
History
11 Mar 2025, 13:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/chat-bubble/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve - Third Party Advisory | |
CWE | CWE-79 | |
First Time |
Bluecoral
Bluecoral chat Bubble |
|
CPE | cpe:2.3:a:bluecoral:chat_bubble:*:*:*:*:*:wordpress:*:* |
21 Nov 2024, 08:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://wordpress.org/plugins/chat-bubble/ - | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/a56772fd-f77f-4ba5-b5c4-79ac8204b599?source=cve - | |
Summary |
|
13 Mar 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-13 16:15
Updated : 2025-03-11 13:21
NVD link : CVE-2024-0898
Mitre link : CVE-2024-0898
CVE.ORG link : CVE-2024-0898
JSON object : View
Products Affected
bluecoral
- chat_bubble
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')