Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42792 | The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message |
Wed, 30 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-30T19:31:45.744Z
Reserved: 2022-10-07T00:00:00.000Z
Link: CVE-2022-3415
Updated: 2024-08-03T01:07:06.696Z
Status : Modified
Published: 2022-11-14T15:15:48.597
Modified: 2025-04-30T20:15:18.790
Link: CVE-2022-3415
No data.
OpenCVE Enrichment
No data.
EUVD