An unauthenticated user can inject arbitrary javascript code in the admin panel by using the text field aNamea of WP Live Chat Support. The arbitrary code runs on the page wplivechat-menu-history.
In the file wp-live-chat-support.php there is no sanitization of $result->id (row 4439).
WP Live Chat Support 8.0.05 is vulnerable, probably earlier versions too.
In WP Live Chat Support 8.0.06 the vulnerability is fixed.
Video PoC: https://www.youtube.com/watch?v=eHG1pWaez9w
URL public disclosure: https://www.gubello.me/blog/wp-live-chat-support-8-0-05-stored-xss/
Sent with [ProtonMail](https://protonmail.com) Secure Email.
WP Live Chat Support 8.0.05 Cross Site Scripting
- Details
- Written by: khalil shreateh
- Category: Vulnerabilities
- Hits: 458