1 results (0.006 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Click to Chat WordPress plugin before 3.18.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. El complemento Click to Chat de WordPress anterior a 3.18.1 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como colaborador realizar ataques de cross-site scripting almacenado que podrían ser utilizados contra usuarios con privilegios elevados, como administradores. The Click to Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcode in versions up to, and including, 3.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •