Loading HuntDB...

Vulnerabilities

CVE-2025-21628

CRITICAL

Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.

Published Jan 09, 2025

CVE-2021-3740

MEDIUM

A Session Fixation vulnerability exists in chatwoot/chatwoot versions prior to 2.4.0. The application does not invalidate existing sessions on other devices when a user changes their password, allowing old sessions to persist. This can lead to unauthorized access if an attacker has obtained a session token.

Published Nov 15, 2024

CVE-2021-3742

HIGH

A Server-Side Request Forgery (SSRF) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.5.0. The vulnerability allows an attacker to upload an SVG file containing a malicious SSRF payload. When the SVG file is used as an avatar and opened in a new tab, it can trigger the SSRF, potentially leading to host redirection.

Published Nov 15, 2024

CVE-2021-3741

HIGH

A stored cross-site scripting (XSS) vulnerability was discovered in chatwoot/chatwoot, affecting all versions prior to 2.6. The vulnerability occurs when a user uploads an SVG file containing a malicious XSS payload in the profile settings. When the avatar is opened in a new page, the custom JavaScript code is executed, leading to potential security risks.

Published Nov 15, 2024

CVE-2023-2109

MEDIUM

Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.14.0.

Published Apr 17, 2023

CVE-2022-3741

CRITICAL

Impact varies for each individual vulnerability in the application. For generation of accounts, it may be possible, depending on the amount of system resources available, to create a DoS event in the server. These accounts still need to be activated; however, it is possible to identify the output Status Code to separate accounts that are generated and waiting for email verification. \n\nFor the sign in directories, it is possible to brute force login attempts to either login portal, which could lead to account compromise.

Published Oct 28, 2022

CVE-2022-2901

HIGH

Improper Authorization in GitHub repository chatwoot/chatwoot prior to 2.8.

Published Sep 06, 2022

CVE-2022-0542

HIGH

Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0.

Published Aug 19, 2022

CVE-2022-1021

HIGH

Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0.

Published Aug 19, 2022

CVE-2022-1022

HIGH

Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.5.0.

Published Apr 21, 2022

CVE-2021-3813

MEDIUM

Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2.

Published Feb 09, 2022

CVE-2022-0527

MEDIUM

Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.

Published Feb 09, 2022

CVE-2022-0526

HIGH

Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.

Published Feb 09, 2022

CVE-2021-3649

HIGH

chatwoot is vulnerable to Inefficient Regular Expression Complexity

Published Jul 16, 2021