Home

Description

EN DE

A vulnerability was identified in chatwoot up to 4.7.0. This vulnerability affects the function initPostMessageCommunication of the file app/javascript/sdk/IFrameHelper.js of the component Widget. The manipulation of the argument baseUrl leads to origin validation error. Remote exploitation of the attack is possible. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in chatwoot up to 4.7.0 gefunden. Es geht dabei um die Funktion initPostMessageCommunication der Datei app/javascript/sdk/IFrameHelper.js der Komponente Widget. Mittels Manipulieren des Arguments baseUrl mit unbekannten Daten kann eine origin validation error-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren.

PUBLISHED Reserved 2025-10-26 | Published 2025-10-27 | Updated 2025-10-27 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
5.0AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Origin Validation Error

Insufficient Verification of Data Authenticity

Timeline

2025-10-26:Advisory disclosed
2025-10-26:VulDB entry created
2025-10-26:VulDB entry last update

Credits

fpatrik (VulDB User) reporter

References

vuldb.com/?id.329916 (VDB-329916 | chatwoot Widget IFrameHelper.js initPostMessageCommunication origin validation) vdb-entry technical-description

vuldb.com/?ctiid.329916 (VDB-329916 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.673800 (Submit #673800 | Chatwoot * Origin Validation Error) third-party-advisory

hckwr.com/blog/multiple-vulnerabilities-in-chatwoot/ related

cve.org (CVE-2025-12245)

nvd.nist.gov (CVE-2025-12245)

Download JSON