Description
The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42792 | The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message |
References
History
Wed, 30 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-30T19:31:45.744Z
Reserved: 2022-10-07T00:00:00.000Z
Link: CVE-2022-3415
Updated: 2024-08-03T01:07:06.696Z
Status : Modified
Published: 2022-11-14T15:15:48.597
Modified: 2025-04-30T20:15:18.790
Link: CVE-2022-3415
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD