CVE-2022-3858: CWE-89 SQL Injection in Unknown Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button
The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin.
AI Analysis
Technical Summary
CVE-2022-3858 is a high-severity SQL Injection vulnerability (CWE-89) found in the WordPress plugin 'Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button' in versions prior to 3.0.3. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. This improper handling allows an authenticated user with at least admin privileges to inject malicious SQL code. Exploiting this flaw can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data, potentially compromising confidentiality, integrity, and availability of the affected WordPress site. The CVSS v3.1 base score is 7.2, reflecting a high severity with network attack vector, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the common use of WordPress and the plugin’s functionality that integrates multiple communication channels. Attackers leveraging this flaw could manipulate chat widget data or pivot to further compromise the hosting environment or connected systems. The vulnerability was reserved in November 2022 and publicly disclosed in December 2022, but no official patches or updates are linked, indicating that users must verify plugin versions and apply updates or mitigations promptly to prevent exploitation.
Potential Impact
For European organizations, this vulnerability can have serious consequences, especially for those relying on WordPress websites with this plugin to manage customer communications across multiple channels. Successful exploitation could lead to data breaches involving customer contact information, communication logs, or other sensitive data stored in the database. This can result in reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions if the website or chat functionality is impaired. Additionally, attackers could leverage the SQL injection to escalate privileges or deploy further malware, threatening broader IT infrastructure. Sectors such as e-commerce, public services, and enterprises with customer-facing portals are particularly at risk. The multi-channel nature of the plugin (Telegram, WeChat, SMS, email) increases the attack surface and potential for lateral movement. Given the high prevalence of WordPress in Europe and the critical role of customer engagement tools, the impact could be widespread if not addressed.
Mitigation Recommendations
1. Immediate verification of the plugin version is essential; upgrade to version 3.0.3 or later where the vulnerability is fixed. If an update is unavailable, consider disabling or removing the plugin until a patch is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to this plugin’s parameters to provide a temporary protective layer. 3. Restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., MFA) to reduce the risk of exploitation by compromised accounts. 4. Conduct regular security audits and database integrity checks to detect unauthorized changes. 5. Monitor logs for unusual database queries or plugin activity indicative of exploitation attempts. 6. Employ principle of least privilege for database users associated with WordPress to limit the impact of any injection. 7. Educate site administrators about the risks of installing plugins from unverified sources and encourage timely patch management. 8. Consider isolating the WordPress environment using containerization or segmentation to limit lateral movement if compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-3858: CWE-89 SQL Injection in Unknown Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button
Description
The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin.
AI-Powered Analysis
Technical Analysis
CVE-2022-3858 is a high-severity SQL Injection vulnerability (CWE-89) found in the WordPress plugin 'Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button' in versions prior to 3.0.3. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. This improper handling allows an authenticated user with at least admin privileges to inject malicious SQL code. Exploiting this flaw can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data, potentially compromising confidentiality, integrity, and availability of the affected WordPress site. The CVSS v3.1 base score is 7.2, reflecting a high severity with network attack vector, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the common use of WordPress and the plugin’s functionality that integrates multiple communication channels. Attackers leveraging this flaw could manipulate chat widget data or pivot to further compromise the hosting environment or connected systems. The vulnerability was reserved in November 2022 and publicly disclosed in December 2022, but no official patches or updates are linked, indicating that users must verify plugin versions and apply updates or mitigations promptly to prevent exploitation.
Potential Impact
For European organizations, this vulnerability can have serious consequences, especially for those relying on WordPress websites with this plugin to manage customer communications across multiple channels. Successful exploitation could lead to data breaches involving customer contact information, communication logs, or other sensitive data stored in the database. This can result in reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions if the website or chat functionality is impaired. Additionally, attackers could leverage the SQL injection to escalate privileges or deploy further malware, threatening broader IT infrastructure. Sectors such as e-commerce, public services, and enterprises with customer-facing portals are particularly at risk. The multi-channel nature of the plugin (Telegram, WeChat, SMS, email) increases the attack surface and potential for lateral movement. Given the high prevalence of WordPress in Europe and the critical role of customer engagement tools, the impact could be widespread if not addressed.
Mitigation Recommendations
1. Immediate verification of the plugin version is essential; upgrade to version 3.0.3 or later where the vulnerability is fixed. If an update is unavailable, consider disabling or removing the plugin until a patch is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to this plugin’s parameters to provide a temporary protective layer. 3. Restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., MFA) to reduce the risk of exploitation by compromised accounts. 4. Conduct regular security audits and database integrity checks to detect unauthorized changes. 5. Monitor logs for unusual database queries or plugin activity indicative of exploitation attempts. 6. Employ principle of least privilege for database users associated with WordPress to limit the impact of any injection. 7. Educate site administrators about the risks of installing plugins from unverified sources and encourage timely patch management. 8. Consider isolating the WordPress environment using containerization or segmentation to limit lateral movement if compromised.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-04T08:38:15.505Z
- Cisa Enriched
- true
Threat ID: 682d9847c4522896dcbf57d9
Added to database: 5/21/2025, 9:09:27 AM
Last enriched: 6/21/2025, 8:37:34 PM
Last updated: 8/10/2025, 1:32:08 AM
Views: 15
Related Threats
CVE-2025-8989: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8988: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.