WordPress Plugin Vulnerabilities
Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty < 3.3.6 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting
Description
The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-hover’ parameter in all versions up to, and including, 3.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affects Plugins
References
Classification
Type
XSS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Webbernaut
Verified
No
WPVDB ID
Timeline
Publicly Published
2025-02-26 (about 1 year ago)
Added
2025-02-26 (about 1 year ago)
Last Updated
2025-02-27 (about 1 year ago)