Description
The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action.
Published: 2025-10-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind Server‑Side Request Forgery that allows unauthenticated attackers to instruct the WordPress server to perform arbitrary HTTP requests via an exposed AJAX endpoint
Action: Patch Now
AI Analysis

Impact

The MxChat – AI Chatbot for WordPress plugin contains a blind Server‑Side Request Forgery vulnerability that permits an unauthenticated attacker to trigger the mxchat_handle_chat_request AJAX action to send HTTP requests to any destination; the flaw originates from insufficient validation of user‑supplied URLs in the plugin’s PDF processing logic and is classified as CWE‑918. Because the server’s responses are not returned to the attacker, exploitation is silent, yet it can be used to probe internal networks, exfiltrate data, or hinder other services that the server can reach.

Affected Systems

All publicly available releases of the plugin up to and including version 2.4.6 are affected. The vendor, MXChat, markets the product under the name “MxChat – AI Chatbot & Content Generation for WordPress.” Users who have installed these versions on their WordPress sites with remote access should consider remediation immediately. While the advisory does not confirm that newer releases are fixed, administrators should verify their installed version and seek an updated release from the plugin repository.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity, and an EPSS score of less than 1 %, signifying a very low likelihood of exploitation in the wild. It is not listed in CISA’s KEV catalog, further underscoring its limited exploitation appetite. The attack vector is straightforward: any party that can reach the WordPress site can invoke the vulnerable AJAX endpoint and make the server act as an outbound proxy. Detection is challenging due to its blind nature, so monitoring outbound traffic or applying mitigations such as URL validation or restricting outbound requests is advisable.

Generated by OpenCVE AI on April 21, 2026 at 02:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MxChat plugin to a version newer than 2.4.6 if an update is available.
  • If no update is available, deactivate or uninstall the plugin to remove the vulnerable endpoint.
  • Restrict the server’s outbound HTTP requests using a web application firewall or network firewall rule, particularly blocking requests to internal IP ranges that the plugin could target.

Generated by OpenCVE AI on April 21, 2026 at 02:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Mxchat
Mxchat ai Chatbot For Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Mxchat
Mxchat ai Chatbot For Wordpress
Wordpress
Wordpress wordpress

Thu, 23 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
Description The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action.
Title MxChat – AI Chatbot for WordPress <= 2.4.6 - Unauthenticated Blind Server-Side Request Forgery
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Mxchat Ai Chatbot For Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:17.803Z

Reserved: 2025-09-18T23:17:38.240Z

Link: CVE-2025-10705

cve-icon Vulnrichment

Updated: 2025-10-23T13:33:40.624Z

cve-icon NVD

Status : Deferred

Published: 2025-10-23T13:15:38.353

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:15:06Z

Weaknesses