[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fXRiKr5TcvH0B61qPO8ZrCqDBGO-YE3RIylqC8yOeqSw":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":16,"references":17,"days_to_patch":19},"WF-91654765-6631-4eb4-9971-32b7db7933e1-chat-help","chat-help-click-to-chat-button-form-missing-authorization-to-unauthenticated-sensitive-information-exposure","Chat Help – Click to Chat Button & Form \u003C= 3.1.3 - Missing Authorization to Unauthenticated Sensitive Information Exposure","The Chat Help – Click to Chat Button & Form plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.3 via the REST API endpoints \u002Fwp-json\u002Fchat-help\u002Fv1\u002Fleads and \u002Fwp-json\u002Fchat-help\u002Fv1\u002Fleads\u002F{id}. This is due to the plugin not performing any authentication and authorization checks. This makes it possible for unauthenticated attackers to extract sensitive data including customer names, email addresses, phone numbers, WhatsApp messages, complete geolocation data (IP addresses, city, country, ISP, coordinates), device fingerprinting information (browser, OS, screen resolution), and WordPress account credentials (user IDs, usernames, emails, names) for logged-in users who submit forms.","chat-help",null,"\u003C=3.1.3","3.1.4","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Missing Authorization","2025-11-18 17:40:13",[18],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F91654765-6631-4eb4-9971-32b7db7933e1?source=api-prod",0]