Filtered by vendor Quantumcloud Subscriptions
Filtered by product Wpbot Subscriptions
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-2811 1 Quantumcloud 1 Wpbot 2025-05-12 4.8 Medium
The AI ChatBot WordPress plugin before 4.5.6 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks to all admin when setting chatbot and all client when using chatbot
CVE-2023-1011 1 Quantumcloud 1 Wpbot 2025-05-12 6.1 Medium
The AI ChatBot WordPress plugin before 4.4.5 does not escape most of its settings before outputting them back in the dashboard, and does not have a proper CSRF check, allowing attackers to make a logged in admin set XSS payloads in them.
CVE-2022-47613 1 Quantumcloud 1 Wpbot 2025-05-12 5.9 Medium
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QuantumCloud AI ChatBot plugin <= 4.3.0 versions.
CVE-2023-1649 1 Quantumcloud 1 Wpbot 2025-05-12 4.8 Medium
The AI ChatBot WordPress plugin before 4.5.1 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
CVE-2023-1660 1 Quantumcloud 1 Wpbot 2025-05-12 6.1 Medium
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in a function hooked to init, allowing unauthenticated users to update some settings, leading to Stored XSS due to the lack of escaping when outputting them in the admin dashboard
CVE-2023-1651 1 Quantumcloud 1 Wpbot 2025-05-12 5.4 Medium
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS
CVE-2023-1650 1 Quantumcloud 1 Wpbot 2025-05-12 9.8 Critical
The AI ChatBot WordPress plugin before 4.4.7 unserializes user input from cookies via an AJAX action available to unauthenticated users, which could allow them to perform PHP Object Injection when a suitable gadget is present on the blog