{"api_version":"1","generated_at":"2026-04-23T13:25:34+00:00","cve":"CVE-2021-25016","urls":{"html":"https://cve.report/CVE-2021-25016","api":"https://cve.report/api/cve/CVE-2021-25016.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-25016","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-25016"},"summary":{"title":"CVE-2021-25016","description":"The Chaty WordPress plugin before 2.8.3 and Chaty Pro WordPress plugin before 2.8.2 do not sanitise and escape the search parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-01-03 13:15:00","updated_at":"2022-01-08 02:39:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0","name":"https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-25016","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25016","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Krzysztof Zając","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"25016","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"premio","cpe5":"chaty","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"25016","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"premio","cpe5":"chaty_pro","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-25016","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Chaty < 2.8.3 - Reflected Cross-Site Scripting"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Floating Chat Widget: Contact Icons, Messages, Telegram, Email, SMS, Call Button – Chaty","version":{"version_data":[{"version_affected":"<","version_name":"2.8.3","version_value":"2.8.3"}]}},{"product_name":"Floating Chat Widget Pro - Chaty Pro","version":{"version_data":[{"version_affected":"<","version_name":"2.8.2","version_value":"2.8.2"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Chaty WordPress plugin before 2.8.3 and Chaty Pro WordPress plugin before 2.8.2 do not sanitise and escape the search parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0","name":"https://wpscan.com/vulnerability/b5035987-6227-4fc6-bc45-1e8016e5c4c0"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-79 Cross-site Scripting (XSS)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Krzysztof Zając"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-01-03 13:15:00","lastModifiedDate":"2022-01-08 02:39:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:premio:chaty_pro:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.8.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:premio:chaty:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.8.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"25016","Ordinal":"199778","Title":"CVE-2021-25016","CVE":"CVE-2021-25016","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"25016","Ordinal":"1","NoteData":"The Chaty WordPress plugin before 2.8.3 and Chaty Pro WordPress plugin before 2.8.2 do not sanitise and escape the search parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting","Type":"Description","Title":null},{"CveYear":"2021","CveId":"25016","Ordinal":"2","NoteData":"2022-01-03","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"25016","Ordinal":"3","NoteData":"2022-01-03","Type":"Other","Title":"Modified"}]}}}