First published: Thu Sep 12 2024(Updated: )
The Gixaw Chat WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7816 has a medium severity rating due to its potential for allowing stored XSS attacks through CSRF vulnerabilities.
To fix CVE-2024-7816, update the Gixaw Chat WordPress plugin to a version beyond 1.0 that implements proper CSRF checks and ensures data sanitization.
CVE-2024-7816 affects Gixaw Chat plugin version 1.0 and prior.
CVE-2024-7816 poses risks such as unauthorized execution of malicious scripts that can compromise site security and user data.
The vendor for CVE-2024-7816 is Adeelraza, the developer of the Gixaw Chat WordPress plugin.