| Kura | Chatwoot * Origin Validation Error |
|---|
| Gaskiya | An unrestricted postMessage vulnerability in Chatwoot widget integrations allows attackers to hijack the cw_conversation token via a crafted message. With one click, an attacker can steal this token and retrieve the full conversation history of a victim, potentially exposing sensitive information. The embedded widget listens to postMessage events without validating the origin of the sender.
A malicious site can send a forged postMessage with the event popoutChatWindow, specifying a malicious baseUrl. Without validating the message origin, the widget directly calls popoutChatWindow with the supplied baseUrl. This function builds a popup URL that includes the cw_conversation cookie value as a parameter and opens it. The attacker can intercept the popup into their own controlled window and capture the cw_conversation token directly from the request URL. |
|---|
| Manga | ⚠️ https://hckwr.com/blog/multiple-vulnerabilities-in-chatwoot/ |
|---|
| Màdùmga | fpatrik (UID 9157) |
|---|
| Furta | 10/12/2025 14:55 (4 Wurɗi 전) |
|---|
| Gargajiya | 10/26/2025 06:12 (14 days later) |
|---|
| Halitta | Shingilam |
|---|
| VulDB gite | 329916 [chatwoot har 4.7.0 Widget IFrameHelper.js initPostMessageCommunication baseUrl kura hakki ndiyam] |
|---|
| Nganji | 20 |
|---|