CVE-2022-4760

The OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:onlinestorekit:oneclick_chat_to_order:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d - Exploit, Third Party Advisory
Summary
  • (es) El complemento OneClick Chat to Order WordPress anterior a 1.0.4.2 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como colaborador realizar cross-site scripting almacenado que podrían utilizarse contra usuarios con privilegios elevados, como administradores.

Information

Published : 2023-01-23 15:15

Updated : 2025-04-02 16:15


NVD link : CVE-2022-4760

Mitre link : CVE-2022-4760

CVE.ORG link : CVE-2022-4760


JSON object : View

Products Affected

onlinestorekit

  • oneclick_chat_to_order
CWE

No CWE.