The OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-01-23 15:15
Updated : 2025-04-02 16:15
NVD link : CVE-2022-4760
Mitre link : CVE-2022-4760
CVE.ORG link : CVE-2022-4760
JSON object : View
Products Affected
onlinestorekit
- oneclick_chat_to_order
CWE
No CWE.