Lucene search

K
wpvulndbJuampa RodríguezWPVDB-ID:012C5B64-EF76-4539-AFD8-40F6C329AE88
HistoryOct 18, 2022 - 12:00 a.m.

Chat Bubble < 2.3 - Unauthenticated Stored Cross-Site Scripting

2022-10-1800:00:00
Juampa Rodríguez
wpscan.com
4
xss
unauthenticated
plugin vulnerability
cross-site scripting
attack scenario

EPSS

0.001

Percentile

45.7%

The plugin does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message

PoC

Setup: - In the General Settings of the plugin, check the “Show Chat Bubble at website” checkbox and save. - In the “Bubble Items” enable the “Simple CallBack” and save. Attacker (unauthenticated): - Access the blog and click on the contact bubble. - In any of the offered fields (fname or fphone), enter the following payload and click “Submit”: The XSS will be triggered when an admin will view the related Callback Message via the Callback dashboard (/wp-admin/edit.php?post_type=cbb_callback => /wp-admin/post.php?post=21&action;=edit)

EPSS

0.001

Percentile

45.7%

Related for WPVDB-ID:012C5B64-EF76-4539-AFD8-40F6C329AE88