Description
Cross-Site Request Forgery (CSRF) vulnerability in raychat Raychat raychat allows Cross Site Request Forgery.This issue affects Raychat: from n/a through <= 2.2.1.
Published: 2025-10-27
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Raychat plugin for WordPress contains a Cross‑Site Request Forgery flaw that allows an attacker to force a logged‑in user to send requests to the site. This can result in the user performing unintended actions such as posting content or changing settings, thereby compromising the integrity of the site. The weakness is classified as CWE‑352, a lack of request validation.

Affected Systems

WordPress sites using the Raychat plugin version 2.2.1 or earlier are affected. The vulnerability applies to all releases from the initial release up to and including 2.2.1.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, while an EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The flaw can be triggered by a simple cross‑site request, typically via a malicious link or embedded form, and requires only that the victim be authenticated. Although the vulnerability is not included in CISA’s KEV catalog, organisations should treat it as a potential risk for integrity compromise and apply remediation promptly.

Generated by OpenCVE AI on April 29, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Raychat plugin to the latest available version (2.2.2 or later).
  • If an upgrade is not possible, uninstall the Raychat plugin to eliminate the attack surface.
  • Consider deploying a Web Application Firewall rule that blocks or challenges suspicious CSRF requests to add an extra layer of protection.

Generated by OpenCVE AI on April 29, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 02:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in raychat Raychat raychat allows Cross Site Request Forgery.This issue affects Raychat: from n/a through <= 2.2.1.
Title WordPress Raychat plugin <= 2.2.1 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:07.319Z

Reserved: 2025-10-24T14:25:07.970Z

Link: CVE-2025-62975

cve-icon Vulnrichment

Updated: 2025-10-27T14:58:38.793Z

cve-icon NVD

Status : Deferred

Published: 2025-10-27T02:15:58.150

Modified: 2026-04-27T17:16:38.980

Link: CVE-2025-62975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T20:30:19Z

Weaknesses