Description
The Click to Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-no_number’ parameter in all versions up to, and including, 4.22 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Any version
Timeline
| 2025-06-13: | Disclosed |
Credits
Asaf Mozes
References
www.wordfence.com/...-a08b-4c25-ac33-d9b7498f5a2c?source=cve
wordpress.org/plugins/click-to-chat-for-whatsapp/
plugins.trac.wordpress.org/...w/inc/assets/js/dev/app.dev.js
plugins.trac.wordpress.org/...w/inc/assets/js/dev/app.dev.js
plugins.trac.wordpress.org/changeset/3309693/