CVE-2025-12751
📋 TL;DR
The WSChat WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to reset plugin settings. This affects all versions up to and including 3.1.6, potentially disrupting chat functionality and configuration.
💻 Affected Systems
- WSChat – WordPress Live Chat
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Malicious authenticated users could reset critical plugin settings, disabling chat functionality, removing security configurations, or causing service disruption for legitimate users.
Likely Case
Low-privilege users resetting chat settings, causing temporary disruption to chat functionality until administrators reconfigure the plugin.
If Mitigated
Minimal impact with proper access controls and monitoring, though settings reset would still require administrative reconfiguration.
🎯 Exploit Status
Exploitation requires authenticated access but is technically simple - just sending a crafted AJAX request to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.7 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WSChat – WordPress Live Chat. 4. Click 'Update Now' if available, or manually update to version 3.1.7+. 5. Verify plugin functionality after update.
🔧 Temporary Workarounds
Restrict User Registration
allTemporarily disable new user registration to prevent new low-privilege accounts from being created.
Remove Subscriber Role Access
allTemporarily elevate all Subscriber users to higher roles or restrict their access to the site.
🧯 If You Can't Patch
- Disable the WSChat plugin entirely until patching is possible
- Implement web application firewall rules to block requests to the vulnerable 'reset_settings' AJAX endpoint
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins → WSChat version. If version is 3.1.6 or lower, system is vulnerable.
Check Version:
wp plugin list --name=wschat --field=version
Verify Fix Applied:
After updating, verify WSChat version shows 3.1.7 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=reset_settings
- Unauthorized users accessing admin-ajax.php with reset_settings parameter
Network Indicators:
- HTTP POST requests to admin-ajax.php endpoint with reset_settings action from non-admin users
SIEM Query:
source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND method="POST" AND params.action="reset_settings" AND user_role!="administrator"