The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/ | Exploit Third Party Advisory |
Configurations
History
02 Jul 2024, 14:44
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
First Time |
Premio floating Chat Widget
Premio |
|
References | () https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:premio:floating_chat_widget:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Jun 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-13 06:15
Updated : 2024-07-02 14:44
NVD link : CVE-2024-4149
Mitre link : CVE-2024-4149
CVE.ORG link : CVE-2024-4149
JSON object : View
Products Affected
premio
- floating_chat_widget
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')