WordPress Plugin Vulnerabilities

Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty < 3.3.6 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting

Description

The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-hover’ parameter in all versions up to, and including, 3.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Affects Plugins

Fixed in 3.3.6

References

Classification

Type
XSS
CWE

Miscellaneous

Original Researcher
Webbernaut
Verified
No

Timeline

Publicly Published
2025-02-26 (about 1 year ago)
Added
2025-02-26 (about 1 year ago)
Last Updated
2025-02-27 (about 1 year ago)

Other