The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
[
{
"vendor": "Unknown",
"product": "Chat Bubble – Floating Chat with Contact Chat Icons, Messages, Telegram, Email, SMS, Call me back",
"versions": [
{
"version": "2.3",
"status": "affected",
"lessThan": "2.3",
"versionType": "custom"
}
]
}
]