CVE-2025-21628

Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:*

History

29 Oct 2025, 14:52

Type Values Removed Values Added
CPE cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:*
Summary
  • (es) Chatwoot es una suite de interacción con el cliente. Antes de la versión 3.16.0, los endpoints de los filtros de conversación y contacto no depuraban la entrada de query_operator que se pasaba desde el frontend o la API. Esto proporcionaba a cualquier actor autenticado un vector de ataque para ejecutar SQL arbitrario dentro de la consulta de filtro agregando una cláusula WHERE tautológica. Este problema se solucionó con la versión 3.16.0.
References () https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b - () https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b - Patch
References () https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9 - () https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9 - Patch, Vendor Advisory
First Time Chatwoot chatwoot
Chatwoot

09 Jan 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-09 18:15

Updated : 2025-10-29 14:52


NVD link : CVE-2025-21628

Mitre link : CVE-2025-21628

CVE.ORG link : CVE-2025-21628


JSON object : View

Products Affected

chatwoot

  • chatwoot
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')