CVE-2025-58688

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Casengo Live Chat Support WordPress plugin allows attackers to inject malicious scripts that execute when administrators view plugin settings. This affects WordPress sites using Casengo Live Chat Support plugin versions up to 2.1.4. The CSRF leads to stored XSS, potentially compromising administrator accounts.

💻 Affected Systems

Products:
  • Casengo Live Chat Support WordPress Plugin
Versions: n/a through 2.1.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Casengo Live Chat Support plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could hijack administrator sessions, install backdoors, steal sensitive data, deface websites, or gain full control of the WordPress installation.

🟠

Likely Case

Attackers would inject malicious JavaScript to steal administrator cookies/sessions, redirect users to phishing sites, or perform unauthorized actions on behalf of logged-in administrators.

🟢

If Mitigated

With proper CSRF protections and Content Security Policy (CSP), the attack would fail or have limited impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an administrator into clicking a malicious link while authenticated. The CSRF vulnerability enables stored XSS payload injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.5 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/the-casengo-chat-widget/vulnerability/wordpress-casengo-live-chat-support-plugin-2-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Casengo Live Chat Support'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.1.5+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Casengo Live Chat Support plugin until patched.

wp plugin deactivate casengo-live-chat-support

Implement CSRF Tokens

all

Add CSRF protection to WordPress forms if custom modifications are possible.

🧯 If You Can't Patch

  • Restrict plugin settings page access to specific IP addresses using .htaccess or web server configuration.
  • Implement strong Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Casengo Live Chat Support version. If version is 2.1.4 or lower, you are vulnerable.

Check Version:

wp plugin get casengo-live-chat-support --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.1.5 or higher in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=casengo-live-chat-support
  • JavaScript injection patterns in plugin settings

Network Indicators:

  • CSRF attack patterns with missing referrer headers or nonce tokens

SIEM Query:

source="wordpress.log" AND ("casengo" OR "admin.php?page=casengo") AND (POST OR "wp_nonce")

🔗 References

📤 Share & Export