Súbít #673800: Chatwoot * Origin Validation Errorbayani

KuraChatwoot * Origin Validation Error
GaskiyaAn unrestricted postMessage vulnerability in Chatwoot widget integrations allows attackers to hijack the cw_conversation token via a crafted message. With one click, an attacker can steal this token and retrieve the full conversation history of a victim, potentially exposing sensitive information. The embedded widget listens to postMessage events without validating the origin of the sender. A malicious site can send a forged postMessage with the event popoutChatWindow, specifying a malicious baseUrl. Without validating the message origin, the widget directly calls popoutChatWindow with the supplied baseUrl. This function builds a popup URL that includes the cw_conversation cookie value as a parameter and opens it. The attacker can intercept the popup into their own controlled window and capture the cw_conversation token directly from the request URL.
Manga⚠️ https://hckwr.com/blog/multiple-vulnerabilities-in-chatwoot/
Màdùmga
 fpatrik (UID 9157)
Furta10/12/2025 14:55 (4 Wurɗi 전)
Gargajiya10/26/2025 06:12 (14 days later)
HalittaShingilam
VulDB gite329916 [chatwoot har 4.7.0 Widget IFrameHelper.js initPostMessageCommunication baseUrl kura hakki ndiyam]
Nganji20

Might our Artificial Intelligence support you?

Check our Alexa App!