Description
The Simple Ajax Chat WordPress plugin before 20240412 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 09 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:plugin-planet:simple_ajax_chat:*:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 21 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Plugin-planet
Plugin-planet simple Ajax Chat |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:plugin-planet:simple_ajax_chat:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Plugin-planet
Plugin-planet simple Ajax Chat |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-01-09T21:31:21.626Z
Reserved: 2024-03-14T19:14:23.713Z
Link: CVE-2024-2470
Updated: 2024-08-01T19:11:53.531Z
Status : Modified
Published: 2024-06-04T06:15:09.937
Modified: 2026-01-09T22:15:58.783
Link: CVE-2024-2470
No data.
OpenCVE Enrichment
No data.
Weaknesses