[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$faJDY-8-zkE36ET2RHUiLbv019zTrJO_Juk9ONPh6RCw":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-0642","jivochat-live-chat-wp-live-chat-plugin-for-wordpress-cross-site-request-forgery-to-cross-site-scripting","JivoChat Live Chat – WP live chat plugin for WordPress \u003C= 1.3.5.3 - Cross-Site Request Forgery to Cross-Site Scripting","The JivoChat Live Chat WordPress plugin before 1.3.5.4 does not properly check CSRF tokens on POST requests to the plugins admin page, and does not sanitise some parameters, leading to a stored Cross-Site Scripting vulnerability where an attacker can trick a logged in administrator to inject arbitrary javascript.","jivochat",null,"\u003C=1.3.5.3","1.3.5.4","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)","2022-05-09 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F034e77ef-fb3f-4e62-be1b-c56c454c5ba8?source=api-prod",624]