Overview
- Description
- The Click to Chat – WP Support All-in-One Floating Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpsaio_snapchat shortcode in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Source
- security@wordfence.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security@wordfence.com
- CWE-79
Social media
- Hype score
- Not currently trending
🚨 CVE-2024-10055 (Published: 2024-10-18) - A medium severity vulnerability in Wordfence affects multiple versions. Users are urged to update to the latest version to mitigate risks. For detailed remediation steps, check out the full report: https://t.co/uvaVGAyvrG #CyberSecurity
@transilienceai
21 Oct 2024
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10055 (Published: 2024-10-18) - A medium severity vulnerability has been identified in Wordfence. Affected versions are at risk! 🛡️ Ensure your site is secure by updating to the latest version and applying all recommended patches. Stay safe! More info:… https://t.co/
@transilienceai
21 Oct 2024
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10055 (Published: 2024-10-18) - High severity vulnerability in Ninja Team Support Chat plugin. Affects versions prior to the latest release. 🛡️ Remediation: Update to the latest version available at https://t.co/iRndRGvKul to secure your site! #WordPress… https://t.c
@transilienceai
21 Oct 2024
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10055 (Published: 2024-10-18) - A high-severity vulnerability in Ninja Team's Support Chat plugin for WordPress. Affects multiple versions. 🔒 Remediation: Update to the latest version available at https://t.co/iRndRGvKul to secure your site! #WordPress #CyberSecurity
@transilienceai
21 Oct 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 CVE-2024-10055 (Published: 2024-10-18) affects Ninja Team Support Chat plugin. Versions prior to the latest release are vulnerable. 🚨 Users are urged to update to the latest version immediately to mitigate risks. Stay secure! More info: https://t.co/iRndRGvKul #CyberSecurity
@transilienceai
21 Oct 2024
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10055 (Published: 2024-10-18) - High severity vulnerability in NinjaTeam. Affects specific versions of the plugin. 🛡️ Ensure your site is secure by updating to the latest version immediately. Check the changeset for details: https://t.co/vZfaIjqoEk #WordPress… https:
@transilienceai
21 Oct 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10055 (Published: 2024-10-18) - High severity vulnerability in NinjaTeam. Affects specific versions of the plugin. 🛡️ Remediation is crucial! Ensure your installation is updated to the latest version to protect against potential exploits. More info:… https://t.co/nej
@transilienceai
21 Oct 2024
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-10055 (Published: 2024-10-18) - A high-severity vulnerability in NinjaTeam plugins for WordPress has been identified. Affected versions are vulnerable to exploitation. 🔒 Ensure you update to the latest version to mitigate risks. Check the details here:… https://t.co/
@transilienceai
21 Oct 2024
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ninjateam:click_to_chat:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "64C989BB-93E2-4412-B1EF-74FAEC7844A5", "versionEndExcluding": "2.3.4" } ], "operator": "OR" } ] } ]