Page 3 of 15 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin. El complemento de WordPress Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button anterior a 3.0.3 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL, lo que lleva a una inyección SQL explotable. por usuarios con un rol tan bajo como administrador. The Chaty plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.0.2 due to insufficient escaping on the $chaty_leads parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level privileges or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Premio Chaty (WordPress plugin) <= 2.8.3 Una vulnerabilidad de tipo Cross-Site Scripting (XSS) Autenticado (admin o rol de usuario superior) almacenado en Premio Chaty (plugin de WordPress) versiones anteriores a 2.8.3 incluyéndola • https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-2-8-3-authenticated-stored-cross-site-scripting-xss-vulnerability https://wordpress.org/plugins/chaty • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs WordPress plugin before 2.0.4 was vulnerable to reflected XSS on the my-sticky-elements-leads admin page. El plugin All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs de WordPress versiones anteriores a 2.0.4, era vulnerable a un ataque de tipo XSS reflejado en la página de administración my-sticky-elements-leads • https://plugins.trac.wordpress.org/changeset/2654453/mystickyelements https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

The Chaty WordPress plugin before 2.8.3 and Chaty Pro WordPress plugin before 2.8.2 do not sanitise and escape the search parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting El plugin Chaty de WordPress versiones anteriores a 2.8.3 y el plugin Chaty Pro de WordPress versiones anteriores a 2.8.2, no sanean y escapan el parámetro search antes de devolverlo al panel de administración, conllevando a un problema de tipo Cross-Site Scripting Reflejado • https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Floating Notification Bar, Sticky Menu on Scroll, and Sticky Header for Any Theme – myStickymenu WordPress plugin before 2.5.2 does not sanitise or escape its Bar Text settings, allowing hight privilege users to use malicious JavaScript in it, leading to a Stored Cross-Site Scripting issue, which will be triggered in the plugin's setting, as well as all front-page of the blog (when the Welcome bar is active) Los plugins Floating Notification Bar, Sticky Menu on Scroll, y Sticky Header for Any Theme – myStickymenu de WordPress versiones anteriores a 2.5.2, no sanea o escapa de la configuración de su Barra de Texto, permitiendo a usuarios con altos privilegios usar JavaScript malicioso en ella, conllevando a un problema de tipo Cross-Site Scripting Almacenado, que será desencadenado en la configuración del plugin, así como en toda la página principal del blog (cuando la Barra de Bienvenida está activa) • https://m0ze.ru/vulnerability/%5B2021-05-21%5D-%5BWordPress%5D-%5BCWE-79%5D-MyStickymenu-WordPress-Plugin-v2.5.1.txt https://wpscan.com/vulnerability/14632fa8-597e-49ff-8583-9797208a3583 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •