Description
The Chat by Chatwee plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.3. This is due to missing or incorrect nonce validation on the admin settings page. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-09-30
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery leading to unauthorized plugin settings modification
Action: Patch immediately
AI Analysis

Impact

The Chat by Chatwee plugin for WordPress versions up to 2.1.3 suffers from a missing or incorrect nonce check on the admin settings page, which allows an unauthenticated attacker to modify plugin settings if they can trick a site administrator into clicking a link. The attacker could change configuration options to their advantage or create a stepping‑stone for further exploitation, although the vulnerability itself does not allow direct code execution.

Affected Systems

This issue applies to the WordPress Chat by Chatwee plugin version 2.1.3 and all earlier releases. Administrators who have installed any of those plugin versions on their sites are affected.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% suggests exploitation is unlikely in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires social engineering – the attacker must lure an administrator into submitting a forged request, so the risk is largely dependent on the likelihood of such a social‑engineering attack.

Generated by OpenCVE AI on April 20, 2026 at 19:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Chat by Chatwee plugin to version 2.1.4 or later.
  • Instruct administrators to avoid clicking suspicious links or unfamiliar URLs.
  • For organizations that cannot immediately update, monitor administrative traffic for unexpected changes or unauthorized settings updates.

Generated by OpenCVE AI on April 20, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-31684 The Chat by Chatwee plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.3. This is due to missing or incorrect nonce validation on the admin settings page. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Tue, 30 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 30 Sep 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Chat by Chatwee plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.3. This is due to missing or incorrect nonce validation on the admin settings page. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Chat by Chatwee <= 2.1.3 - Cross-Site Request Forgery to Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:18:06.808Z

Reserved: 2025-09-03T13:33:11.490Z

Link: CVE-2025-9948

cve-icon Vulnrichment

Updated: 2025-09-30T15:31:57.218Z

cve-icon NVD

Status : Deferred

Published: 2025-09-30T11:37:47.570

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9948

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:30:06Z

Weaknesses