Input validation vulnerability in Two Way Chat – Send or receive messages to your user 3.1.4

The Two Way Chat plugin for WordPress has a security issue in versions 3.1.4 and below that can be exploited by malicious attackers. Attackers with administrator privileges can include and run any file on the server, including any kind of code written in PHP. This can be used to obtain confidential information, bypass security measures, or even execute code. This attack can be done even if the server only allows the uploading of “safe” files, such as images.

Detected in:

Two Way Chat – Send or receive messages to your user open vulnerable versions: >= * <= 3.1.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.