VYPR
Medium severity6.5NVD Advisory· Published Jul 20, 2024· Updated Apr 15, 2026

CVE-2024-37563

CVE-2024-37563

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in TOCHAT.BE allows Stored XSS.This issue affects TOCHAT.BE: from n/a through 1.3.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS vulnerability in TOCHAT.BE WordPress plugin allows unauthenticated attackers to inject malicious scripts.

Vulnerability

Overview The TOCHAT.BE WordPress plugin up to version 1.3.0 contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This allows attackers to inject arbitrary HTML and JavaScript code into posts or pages.

Exploitation

Attackers can exploit this vulnerability without authentication by sending crafted input that, when saved and later viewed by other users, executes the injected script in the victim's browser [1]. The plugin is used on many sites, making it a target for mass exploitation campaigns.

Impact

Successful exploitation leads to execution of malicious scripts, which can be used to steal session cookies, redirect users to phishing sites, or perform other actions in the context of the victim's session [1]. The CVSS score of 6.5 reflects the potential for significant impact.

Mitigation

The vulnerability is fixed in version 1.3.2 of the TOCHAT.BE plugin [1]. Users are strongly advised to update immediately. Hosting providers can also apply virtual patching until the update is installed.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.