First published: Mon Jul 17 2023(Updated: )
The Floating Chat Widget WordPress plugin before 3.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Premio Chaty | <3.1.2 | |
<3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-3245.
The severity of CVE-2023-3245 is medium with a severity value of 4.8.
The Floating Chat Widget WordPress plugin before 3.1.2 is a plugin that provides a chat widget for WordPress websites.
CVE-2023-3245 could allow high privilege users, such as admin, to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
To fix CVE-2023-3245, it is recommended to update to version 3.1.2 or later of the Floating Chat Widget WordPress plugin.