Headline
CVE-2023-47829: WordPress Quick Call Button plugin <= 1.2.9 - Cross Site Scripting (XSS) vulnerability - Patchstack
Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in Codez Quick Call Button plugin <= 1.2.9 versions.
Solution
No fix
No patched version is available. This plugin has been closed as of October 27, 2023 and is not available for download. This closure is temporary, pending a full review.
Found this useful? Thank Muhammad Daffa for reporting this vulnerability. Buy a coffee ☕
Muhammad Daffa discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Quick Call Button Plugin. This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site. This vulnerability has not been known to be fixed yet.
No other known vulnerabilities for this pluginReport
WordPress plugin developer?
Start a free security program for your WordPress plugins or request an audit.
Apply for MVDP
Security researcher?
Report to Patchstack Alliance bounty platform and earn monthly cash prizes.
Learn more