Input validation vulnerability in OneClick Chat to Order 1.0.5

The OneClick Chat to Order plugin for WordPress has a security issue that could potentially put users at risk. This is because the plugin does not properly filter and protect against harmful code, making it possible for attackers to inject their own scripts into pages. This can be done by someone with contributor-level access or higher, and the scripts will run whenever a user visits the affected page.

Detected in:

OneClick Chat to Order fixed vulnerable versions: >= * <= 1.0.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.