{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12245","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-26T05:12:01.062Z","datePublished":"2025-10-27T07:32:07.544Z","dateUpdated":"2026-02-26T16:57:05.851Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-27T07:32:07.544Z"},"title":"chatwoot Widget IFrameHelper.js initPostMessageCommunication origin validation","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-346","lang":"en","description":"Origin Validation Error"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-345","lang":"en","description":"Insufficient Verification of Data Authenticity"}]}],"affected":[{"vendor":"n/a","product":"chatwoot","versions":[{"version":"4.0","status":"affected"},{"version":"4.1","status":"affected"},{"version":"4.2","status":"affected"},{"version":"4.3","status":"affected"},{"version":"4.4","status":"affected"},{"version":"4.5","status":"affected"},{"version":"4.6","status":"affected"},{"version":"4.7.0","status":"affected"}],"modules":["Widget"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in chatwoot up to 4.7.0. This vulnerability affects the function initPostMessageCommunication of the file app/javascript/sdk/IFrameHelper.js of the component Widget. The manipulation of the argument baseUrl leads to origin validation error. Remote exploitation of the attack is possible. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in chatwoot up to 4.7.0 gefunden. Es geht dabei um die Funktion initPostMessageCommunication der Datei app/javascript/sdk/IFrameHelper.js der Komponente Widget. Mittels Manipulieren des Arguments baseUrl mit unbekannten Daten kann eine origin validation error-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-26T06:17:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"fpatrik (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.329916","name":"VDB-329916 | chatwoot Widget IFrameHelper.js initPostMessageCommunication origin validation","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.329916","name":"VDB-329916 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.673800","name":"Submit #673800 | Chatwoot * Origin Validation Error","tags":["third-party-advisory"]},{"url":"https://hckwr.com/blog/multiple-vulnerabilities-in-chatwoot/","tags":["related"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-12245","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-01-01T04:55:25.382716Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:57:05.851Z"}}]}}