Description
Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat xelion-webchat allows Privilege Escalation.This issue affects Xelion Webchat: from n/a through <= 9.1.0.
Published: 2025-04-17
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability arises from an incorrect assignment of user privileges within the Jauhari Xelion Webchat plugin. A flaw in the plugin’s internal role checks allows a user to obtain a higher level of access than intended. The effect is a privilege escalation that can potentially grant a user administrator‑like capabilities on a WordPress site, enabling full control over content, configuration, and user accounts.

Affected Systems

The vulnerability affects all releases of the Xelion Webchat plugin up to and including version 9.1.0. WordPress sites that have installed the plugin, which provides real‑time chat functionality, are impacted. Site administrators should verify the plugin version and apply a fix if available.

Risk and Exploitability

The CVSS base score of 8.8 reflects high severity for privilege escalation. The EPSS score of less than 1 % indicates that widescale exploitation is unlikely at this time. The vulnerability is not listed in CISA’s KEV catalog. Attackers who can authenticate to the WordPress site, or who can access the plugin’s web interfaces, may exploit the flaw to elevate privileges. Because the issue is tied to the plugin’s privilege‑assignment logic, an attacker does not need pre‑existing admin rights to trigger the escalation.

Generated by OpenCVE AI on May 1, 2026 at 09:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Xelion Webchat plugin to the newest available version that releases after 9.1.0.
  • If an updated version is not available or cannot be installed, consider removing or disabling the plugin from the WordPress installation to eliminate the vulnerability.
  • Restrict plugin functionality and endpoints so that only users with the appropriate administrative privileges can access privileged actions, by adding role checks or configuration settings.
  • Continuously monitor WordPress audit logs for unexpected changes to user roles or the creation of new administrator accounts, and configure alerts for such events.

Generated by OpenCVE AI on May 1, 2026 at 09:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11743 Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat allows Privilege Escalation. This issue affects Xelion Webchat: from n/a through 9.1.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat allows Privilege Escalation. This issue affects Xelion Webchat: from n/a through 9.1.0. Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat xelion-webchat allows Privilege Escalation.This issue affects Xelion Webchat: from n/a through <= 9.1.0.
Title WordPress Xelion Webchat <= 9.1.0 - Privilege Escalation Vulnerability WordPress Xelion Webchat plugin <= 9.1.0 - Privilege Escalation Vulnerability
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Incorrect Privilege Assignment vulnerability in Jauhari Xelion Xelion Webchat allows Privilege Escalation. This issue affects Xelion Webchat: from n/a through 9.1.0.
Title WordPress Xelion Webchat <= 9.1.0 - Privilege Escalation Vulnerability
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:34.341Z

Reserved: 2025-04-16T06:24:47.077Z

Link: CVE-2025-39542

cve-icon Vulnrichment

Updated: 2025-04-17T17:41:46.595Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:57.147

Modified: 2026-04-23T15:29:45.463

Link: CVE-2025-39542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T10:00:12Z

Weaknesses