WordPress Plugin Vulnerabilities
Tawk.to Live Chat < 0.6.0 - Subscriber+ Visitor Monitoring & Chat Removal
Description
The plugin does not have capability and CSRF checks in the tawkto_setwidget and tawkto_removewidget AJAX actions, available to any authenticated user. The first one allows low-privileged users (including simple subscribers) to change the 'tawkto-embed-widget-page-id' and 'tawkto-embed-widget-widget-id' parameters. Any authenticated user can thus link the vulnerable website to their own Tawk.to instance. Consequently, they will be able to monitor the vulnerable website and interact with its visitors (receive contact messages, answer, ...). They will also be able to display an arbitrary Knowledge Base. The second one will remove the live chat widget from pages.
Proof of Concept
Affects Plugins
References
CVE
Classification
Type
NO AUTHORISATION
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Quentin VILLAIN (3wsec)
Submitter
Quentin VILLAIN (3wsec)
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-11-08 (about 4 years ago)
Added
2021-11-08 (about 4 years ago)
Last Updated
2022-04-11 (about 3 years ago)