Description
A vulnerability was identified in chatwoot up to 4.11.2. Affected by this vulnerability is the function Webhooks::Trigger in the library lib/webhooks/trigger.rb of the component Webhook API. Such manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-31
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

A server‑side request forgery vulnerability was discovered in the Chatwoot customer engagement platform. The flaw resides in the Webhooks::Trigger method within the lib/webhooks/trigger.rb file, where user‐supplied URLs are passed directly to outbound HTTP requests without adequate validation. By crafting a malicious payload to the webhook API, an attacker can cause the Chatwoot server to send arbitrary HTTP requests to internal or otherwise inaccessible resources, potentially enabling data exfiltration, internal network reconnaissance, or serving as a pivot for further attacks. The weakness is typical of input that controls outbound network traffic.

Affected Systems

Any Chatwoot deployment running version 4.11.2 or earlier is impacted. The vulnerability exists in the Webhook API component, specifically in the Trigger functionality. No additional vendor product versions are listed, so all instances of Chatwoot within the affected version range should be considered vulnerable.

Risk and Exploitability

The CVSS base score of 5.3 categorizes the risk level as moderate, and the remote nature of the webhook endpoint means that the flaw can be triggered from any system that can reach the API. Public exploits are available, indicating that adversaries may already be leveraging the flaw. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog, but the combination of a remote attack vector, lack of mandatory authentication for the endpoint, and known exploit code suggests a non‑negligible likelihood of exploitation.

Generated by OpenCVE AI on March 31, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chatwoot to the latest release that includes the SSRF fix
  • Restrict outbound traffic from the webhook service by applying firewall rules or network segmentation
  • Validate webhook URLs against a strict whitelist to allow only trusted domains
  • Monitor outbound HTTP requests originating from the webhook component for abnormal activity

Generated by OpenCVE AI on March 31, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Chatwoot
Chatwoot chatwoot
Vendors & Products Chatwoot
Chatwoot chatwoot

Tue, 31 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in chatwoot up to 4.11.2. Affected by this vulnerability is the function Webhooks::Trigger in the library lib/webhooks/trigger.rb of the component Webhook API. Such manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title chatwoot Webhook API trigger.rb Trigger server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Chatwoot Chatwoot
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T16:30:11.076Z

Reserved: 2026-03-31T08:48:35.949Z

Link: CVE-2026-5205

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-31T17:16:33.090

Modified: 2026-03-31T17:16:33.090

Link: CVE-2026-5205

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:37:52Z

Weaknesses