Описание
The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.3 (исключая)
cpe:2.3:a:bluecoral:chat_bubble:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 78%
0.01134
Низкий
6.1 Medium
CVSS3
Дефекты
CWE-79
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 6.1
github
около 3 лет назад
The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
EPSS
Процентиль: 78%
0.01134
Низкий
6.1 Medium
CVSS3
Дефекты
CWE-79
CWE-79
CWE-79