CVE-2025-12245
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-10-28
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chatwoot | chatwoot | to 4.7.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-346 | The product does not properly verify that the source of data or communication is valid. |
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Chatwoot (up to version 4.7.0) affects the Widget component's postMessage communication. The widget listens to postMessage events without validating the origin of the sender, allowing an attacker to send a crafted postMessage event named "popoutChatWindow" with a malicious baseUrl. Because the origin is not checked, the widget calls the popoutChatWindow function with the attacker-supplied baseUrl, which constructs a popup URL embedding the victim's cw_conversation cookie as a parameter. The attacker can intercept this popup in a window they control and steal the cw_conversation token, which grants access to the victim's full chat conversation history, potentially exposing sensitive information. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized hijacking of active chat sessions by stealing the cw_conversation token. Since these tokens do not expire, attackers can maintain persistent unauthorized access to victims' full chat conversation histories, exposing sensitive information. Additionally, the vulnerability enables cross-origin abuse by allowing attackers to intercept popups and potentially exploit the victim's session without authentication. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can focus on monitoring for suspicious postMessage events named "popoutChatWindow" originating from untrusted sources. Since the vulnerability involves the Chatwoot widget listening to postMessage events without origin validation, you can inspect browser console logs or network traffic for such events. Additionally, checking for popup windows opened with URLs containing the cw_conversation token as a parameter may indicate exploitation attempts. Specific commands are not provided in the resources, but monitoring browser developer tools for postMessage events and network requests related to Chatwoot widgets is recommended. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include validating the origin of postMessage events in the Chatwoot widget, accepting messages only from trusted domains. Avoid exposing sensitive cookies like cw_conversation in popup URLs by using secure methods such as HttpOnly cookies or short-lived server-generated tokens. Modify the popoutChatWindow function to exclude the conversation token from URLs. Additionally, sanitize any URLs used in iframes to prevent reflected DOM XSS. Since no official patch or vendor response is available, consider applying these mitigations in your deployment or using alternative products. [2, 3]