Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mxchat
Mxchat ai Chatbot For Wordpress Wordpress Wordpress wordpress |
|
| Vendors & Products |
Mxchat
Mxchat ai Chatbot For Wordpress Wordpress Wordpress wordpress |
Thu, 23 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MxChat – AI Chatbot for WordPress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.4.6. This is due to insufficient validation of user-supplied URLs in the PDF processing functionality. This makes it possible for unauthenticated attackers to make the WordPress server perform HTTP requests to arbitrary destinations via the mxchat_handle_chat_request AJAX action. | |
| Title | MxChat – AI Chatbot for WordPress <= 2.4.6 - Unauthenticated Blind Server-Side Request Forgery | |
| Weaknesses | CWE-918 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-23T13:33:47.776Z
Reserved: 2025-09-18T23:17:38.240Z
Link: CVE-2025-10705
Updated: 2025-10-23T13:33:40.624Z
Status : Awaiting Analysis
Published: 2025-10-23T13:15:38.353
Modified: 2025-10-27T13:20:33.350
Link: CVE-2025-10705
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:17:04Z