The OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 02 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-02T15:42:05.936Z
Reserved: 2022-12-27T09:49:10.707Z
Link: CVE-2022-4760

Updated: 2024-08-03T01:48:40.480Z

Status : Modified
Published: 2023-01-23T15:15:17.597
Modified: 2025-04-02T16:15:29.490
Link: CVE-2022-4760

No data.

No data.