Input validation vulnerability in OneClick Chat to Order 1.0.5

The OneClick Chat to Order plugin for WordPress is vulnerable to attacks that could allow malicious web scripts to be stored on pages of the website. This vulnerability affects all versions of the plugin up to, and including, 1.0.5. Attackers with permission to contribute to the website could use this vulnerability to inject malicious web scripts into pages, which would then execute automatically when a user visits the page. This could lead to sensitive information being exposed or other malicious activity.

Detected in:

OneClick Chat to Order fixed vulnerable versions: >= * <= 1.0.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.