The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message
CPE | Name | Operator | Version |
---|---|---|---|
chat_bubble | lt | 2.3 |