Input validation vulnerability in Chat Bubble – Floating Chat with Contact Chat Icons, Messages, Telegram, Email, SMS, Call me back 2.3

The Chat Bubble plugin for WordPress is not secure in versions up to 2.3, as it is vulnerable to Cross-Site Request Forgery. This means that someone could make a fake request to the website, and if an administrator of the site clicks on a link, it could allow that person to change the settings of the plugin. Therefore, users of the plugin should check that they have the latest version available to protect against this vulnerability.

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.