CVE-2025-12751

4.3 MEDIUM

📋 TL;DR

The WSChat WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to reset plugin settings. This affects all versions up to and including 3.1.6, potentially disrupting chat functionality and configuration.

💻 Affected Systems

Products:
  • WSChat – WordPress Live Chat
Versions: All versions up to and including 3.1.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WSChat plugin enabled and at least one authenticated user with Subscriber role or higher.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could reset critical plugin settings, disabling chat functionality, removing security configurations, or causing service disruption for legitimate users.

🟠

Likely Case

Low-privilege users resetting chat settings, causing temporary disruption to chat functionality until administrators reconfigure the plugin.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring, though settings reset would still require administrative reconfiguration.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - just sending a crafted AJAX request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.7 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3395773%40wschat-live-chat&new=3395773%40wschat-live-chat&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WSChat – WordPress Live Chat. 4. Click 'Update Now' if available, or manually update to version 3.1.7+. 5. Verify plugin functionality after update.

🔧 Temporary Workarounds

Restrict User Registration

all

Temporarily disable new user registration to prevent new low-privilege accounts from being created.

Remove Subscriber Role Access

all

Temporarily elevate all Subscriber users to higher roles or restrict their access to the site.

🧯 If You Can't Patch

  • Disable the WSChat plugin entirely until patching is possible
  • Implement web application firewall rules to block requests to the vulnerable 'reset_settings' AJAX endpoint

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → WSChat version. If version is 3.1.6 or lower, system is vulnerable.

Check Version:

wp plugin list --name=wschat --field=version

Verify Fix Applied:

After updating, verify WSChat version shows 3.1.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=reset_settings
  • Unauthorized users accessing admin-ajax.php with reset_settings parameter

Network Indicators:

  • HTTP POST requests to admin-ajax.php endpoint with reset_settings action from non-admin users

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="reset_settings" AND user_role!="administrator"

🔗 References

📤 Share & Export