Description
Missing Authorization vulnerability in ThemeAtelier Chat Help chat-help allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chat Help: from n/a through <= 3.1.3.
Published: 2025-11-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a missing Authorization flaw in the ThemeAtelier Chat Help plugin for WordPress that allows attackers to bypass intended security levels and gain unauthorized access to plugin data or functions. This issue is classified as CWE‑862, meaning the plugin fails to enforce proper access control. Because the flaw is present in all releases up to 3.1.3, any site that has installed a vulnerable version could potentially expose chat information or administrative capabilities to an attacker. The CVSS score of 5.3 reflects a moderate severity for potential data exposure or modification. WordPress installations that have installed the ThemeAtelier Chat Help plugin version 3.1.3 or older are affected, regardless of other plugins or themes. The issue is limited to the plugin; the core WordPress platform itself is not directly impacted. The CVSS base score of 5.3 and an EPSS score of less than 1 % indicate that the likelihood of exploitation is presently low and the vulnerability has not been reported in the CISA KEV catalog. However, the flaw can be triggered by any user who can submit requests to the plugin’s endpoints, especially if the site owner has configured the plugin for low or no authentication. Attackers may therefore use simple crafted HTTP requests to the plugin’s back‑end APIs in order to retrieve or modify chat logs if the plugin’s access levels are misconfigured.

Affected Systems

ThemeAtelier Chat Help plugin for WordPress, versions up to and including 3.1.3. This includes all WordPress sites that have installed these vulnerable plugin versions. No other vendor or product is mentioned as affected.

Risk and Exploitability

The vulnerability is rated with a CVSS of 5.3, suggesting a moderate risk. The EPSS score indicates a very low probability of exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog, meaning no confirmed exploit has been documented publicly. The likely attack vector is through unauthenticated or low‑privileged users sending crafted HTTP requests to the plugin’s API endpoints, owing to the missing enforcement of access control. Attackers could potentially read or modify chat data, depending on the configuration of the plugin. Because the flaw is tied to the plugin’s configuration rather than an arbitrary codepath, remediation does not require changing WordPress core. The risk is higher in environments where the plugin’s access settings are weak or where the plugin is exposed to the internet without additional restrictions.

Generated by OpenCVE AI on April 29, 2026 at 11:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ThemeAtelier Chat Help plugin to the latest version that includes the access‑control fix.
  • Verify the plugin’s configuration to ensure that access levels cannot be overridden or set to allow anonymous access.
  • If the plugin is not essential, consider disabling or removing it until the security update is applied.

Generated by OpenCVE AI on April 29, 2026 at 11:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in ThemeAtelier Chat Help chat-help allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Chat Help: from n/a through <= 3.1.3.
Title WordPress Chat Help plugin <= 3.1.3 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:07:42.662Z

Reserved: 2025-11-21T11:21:12.145Z

Link: CVE-2025-66099

cve-icon Vulnrichment

Updated: 2025-11-21T16:29:57.483Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T13:15:51.510

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-66099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T11:45:10Z

Weaknesses