Show filters
43 Total Results
Displaying 11-20 of 43
Sort by:
Attacker Value
Unknown
CVE-2024-0451
Disclosure Date: May 22, 2024 (last updated January 05, 2025)
The AI ChatBot plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the openai_file_list_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to list files existing in a linked OpenAI account.
0
Attacker Value
Unknown
CVE-2024-34380
Disclosure Date: May 06, 2024 (last updated May 07, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuantumCloud Conversational Forms for ChatBot allows Stored XSS.This issue affects Conversational Forms for ChatBot: from n/a through 1.2.0.
0
Attacker Value
Unknown
CVE-2024-32696
Disclosure Date: April 22, 2024 (last updated April 22, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuantumCloud Infographic Maker – iList allows Stored XSS.This issue affects Infographic Maker – iList: from n/a through 4.6.6.
0
Attacker Value
Unknown
CVE-2024-22309
Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Deserialization of Untrusted Data vulnerability in QuantumCloud ChatBot with AI.This issue affects ChatBot with AI: from n/a through 5.1.0.
0
Attacker Value
Unknown
CVE-2023-48741
Disclosure Date: December 19, 2023 (last updated December 23, 2023)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in QuantumCloud AI ChatBot.This issue affects AI ChatBot: from n/a through 4.7.8.
0
Attacker Value
Unknown
CVE-2023-5606
Disclosure Date: November 02, 2023 (last updated November 10, 2023)
The ChatBot for WordPress is vulnerable to Stored Cross-Site Scripting via the FAQ Builder in versions 4.8.6 through 4.9.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. NOTE: This vulnerability is a re-introduction of CVE-2023-4253.
0
Attacker Value
Unknown
CVE-2023-5534
Disclosure Date: October 20, 2023 (last updated October 30, 2023)
The AI ChatBot plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.8.9 and 4.9.2. This is due to missing or incorrect nonce validation on the corresponding functions. This makes it possible for unauthenticated attackers to invoke those functions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2023-5533
Disclosure Date: October 20, 2023 (last updated October 30, 2023)
The AI ChatBot plugin for WordPress is vulnerable to unauthorized use of AJAX actions due to missing capability checks on the corresponding functions in versions up to, and including, 4.8.9 as well as 4.9.2. This makes it possible for unauthenticated attackers to perform some of those actions that were intended for higher privileged users.
0
Attacker Value
Unknown
CVE-2023-5254
Disclosure Date: October 19, 2023 (last updated October 26, 2023)
The ChatBot plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.8.9 via the qcld_wb_chatbot_check_user function. This can allow unauthenticated attackers to extract sensitive data including confirmation as to whether a user name exists on the site as well as order information for existing users.
0
Attacker Value
Unknown
CVE-2023-5241
Disclosure Date: October 19, 2023 (last updated October 26, 2023)
The AI ChatBot for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.8.9 as well as 4.9.2 via the qcld_openai_upload_pagetraining_file function. This allows subscriber-level attackers to append "<?php" to any existing file on the server resulting in potential DoS when appended to critical files such as wp-config.php.
0