Impact
The WSChat – WordPress Live Chat plugin has a missing capability check on the 'reset_settings' AJAX endpoint in all releases up to 3.1.6. This allows any authenticated user with Subscriber level or higher to reset the plugin’s configuration, disrupting chat availability and any services that depend on the live chat integration. The vulnerability is a classic privilege‑escalation problem, identified as CWE-862, where insufficient authorization checks permit unauthorized state changes.
Affected Systems
All WordPress installations that have the WSChat – WordPress Live Chat plugin installed and running version 3.1.6 or earlier. The flaw is independent of the underlying operating system or theme and targets only the plugin code.
Risk and Exploitability
The CVSS score of 4.3 classifies the issue as low severity, while the EPSS score of less than 1% indicates a very low probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. Because the flaw requires an authenticated user with Subscriber‑level or higher access, the attack vector is login‑based; an attacker can trigger the vulnerable AJAX endpoint via a direct web request or through the admin panel. The impact is limited to configuration changes, but it can still cause service disruption if the chat is a critical component of the site.
OpenCVE Enrichment