The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-hover’ parameter in all versions up to, and including, 3.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
11 Mar 2025, 15:46
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:premio:floating_chat_widget:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.4/js/cht-front-script.js#L389 - Product | |
References | () https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.5/js/cht-front-script.min.js - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3246336/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/a87d0966-3fd4-46f8-acd5-1cf0cb18af42?source=cve - Third Party Advisory | |
First Time |
Premio
Premio floating Chat Widget |
27 Feb 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 10:15
Updated : 2025-03-11 15:46
NVD link : CVE-2025-1450
Mitre link : CVE-2025-1450
CVE.ORG link : CVE-2025-1450
JSON object : View
Products Affected
premio
- floating_chat_widget
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')