Vulnerabilities
Vulnerable Software
3cx:  Security Vulnerabilities
The wp-live-chat-support plugin before 8.0.18 for WordPress has wp-admin/admin.php?page=wplivechat-menu-gdpr-page term XSS.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-03-22
XSS exists in the wp-live-chat-support v8.0.15 plugin for WordPress via the modules/gdpr.php term parameter in a wp-admin/admin.php wplivechat-menu-gdpr-page request.
CVSS Score
6.1
EPSS Score
0.003
Published
2018-10-18
The Web server in 3CX version 15.5.8801.3 is vulnerable to Reflected XSS on the api/CallLog TimeZoneName parameter.
CVSS Score
6.1
EPSS Score
0.002
Published
2018-08-03
The Web server in 3CX version 15.5.8801.3 is vulnerable to Reflected XSS on all stack traces' propertyPath parameters.
CVSS Score
6.1
EPSS Score
0.002
Published
2018-08-03
The Web server in 3CX version 15.5.8801.3 is vulnerable to Information Leakage, because of improper error handling in Stack traces, as demonstrated by discovering a full pathname.
CVSS Score
5.3
EPSS Score
0.002
Published
2018-08-03
The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type.
CVSS Score
9.8
EPSS Score
0.106
Published
2018-07-02
There is stored cross site scripting in the wp-live-chat-support plugin before 8.0.08 for WordPress via the "name" (aka wplc_name) and "email" (aka wplc_email) input fields to wp-json/wp_live_chat_support/v1/start_chat whenever a malicious attacker would initiate a new chat with an administrator. NOTE: this issue exists because of an incomplete fix for CVE-2018-9864.
CVSS Score
6.1
EPSS Score
0.004
Published
2018-05-15
The WP Live Chat Support plugin before 8.0.06 for WordPress has stored XSS via the Name field.
CVSS Score
6.1
EPSS Score
0.004
Published
2018-04-09
On 3CX 15.5.6354.2 devices, the parameter "file" in the request "/api/RecordingList/download?file=" allows full access to files on the server via path traversal.
CVSS Score
6.5
EPSS Score
0.004
Published
2018-03-04
In the 3CX Phone System 15.5.3554.1, the Management Console typically listens to port 5001 and is prone to a directory traversal attack: "/api/RecordingList/DownloadRecord?file=" and "/api/SupportInfo?file=" are the vulnerable parameters. An attacker must be authenticated to exploit this issue to access sensitive information to aid in subsequent attacks.
CVSS Score
6.5
EPSS Score
0.069
Published
2017-10-18


Contact Us

Shodan ® - All rights reserved