Input validation vulnerability in TelSender – Wp to telegram СF 7, Events, Wpforms, Ninja forms, Wooccommerce 1.14.14

A plugin called TelSender for WordPress is at risk for a type of cyber attack called DOM-Based Cross-Site Scripting. This can happen in versions 1.14.14 and lower. The issue is that the plugin does not properly check for harmful code when handling responses from the Telegram API. This means that attackers who are not logged in can insert harmful code into the titles of Telegram chats. When an administrator of the website opens the TelSender settings page and clicks the “Tested” button, the malicious code can be executed.

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.