Description
The Wise Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-17
Score: 7.2 High
EPSS: 1.2% Low
KEV: No
Impact: Stored Cross‑Site Scripting allowing arbitrary script execution by any user
Action: Immediate Patch
AI Analysis

Impact

The Wise Chat WordPress plugin allows a malicious actor to persistently insert arbitrary JavaScript code into stored content by exploiting improper sanitization of the X‑Forwarded‑For header. Because the header is stored and later rendered on pages accessed by other site users, an unauthenticated attacker can compromise the confidentiality and integrity of all users’ browsers, leading to credential theft, session hijacking or further attacks. This flaw is an instance of CWE‑79 and is specifically a stored XSS that can be triggered without authentication.

Affected Systems

All WordPress sites running Wise Chat version 3.3.4 or earlier are affected. The vulnerability exists in the file `wise-chat/admin/WiseChatKicksTab.php` where the X‑Forwarded‑For header value is accepted without filtering.

Risk and Exploitability

The CVSS score of 7.2 indicates high severity, and the EPSS score of 1 % suggests a low but non‑zero probability of exploitation at the time of analysis. The vulnerability is not included in CISA’s KEV catalog. The attack vector is inferred to be a simple HTTP request containing a crafted X‑Forwarded‑For header against the administration endpoint, after which the malicious payload is stored and executed whenever any user visits a page that includes the injected content.

Generated by OpenCVE AI on April 21, 2026 at 20:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Wise Chat plugin to the latest version (3.3.5 or newer) and confirm the security fix is applied.
  • Modify the web server or application configuration to ignore or strip the X‑Forwarded‑For header for requests reaching the WordPress back‑end, preventing the header from being processed by WordPress.
  • If an update cannot be performed immediately, implement a content security policy (CSP) header that restricts unsafe scripts and ensure output from admin inputs is properly escaped before being sent to user browsers.

Generated by OpenCVE AI on April 21, 2026 at 20:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18449 The Wise Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 17 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 02:00:00 +0000

Type Values Removed Values Added
Description The Wise Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the X-Forwarded-For header in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Wise Chat <= 3.3.4 - Unauthenticated Stored Cross-Site Scripting via X-Forwarded-For Header
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:45:52.228Z

Reserved: 2025-04-17T16:19:28.304Z

Link: CVE-2025-3774

cve-icon Vulnrichment

Updated: 2025-06-17T14:17:37.565Z

cve-icon NVD

Status : Deferred

Published: 2025-06-17T02:15:18.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3774

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:15:44Z

Weaknesses