First published: Wed Apr 24 2024(Updated: )
The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Floating Chat Widget | <3.1.9 | |
Premio Floating Chat Widget | <3.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2972 is considered a high severity vulnerability due to the potential for Stored Cross-Site Scripting (XSS) attacks.
To fix CVE-2024-2972, update the WordPress Floating Chat Widget plugin to version 3.1.9 or later.
Administrators or high privilege users of the WordPress Floating Chat Widget plugin prior to version 3.1.9 are affected by CVE-2024-2972.
CVE-2024-2972 allows high privilege users to perform Stored Cross-Site Scripting (XSS) attacks by exploiting unsanitized settings.
CVE-2024-2972 was disclosed in 2024, highlighting vulnerabilities in versions of the plugin before 3.1.9.