Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3858: CWE-89 SQL Injection in Unknown Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button

0
High
VulnerabilityCVE-2022-3858cvecve-2022-3858cwe-89-sql-injection
Published: Mon Dec 05 2022 (12/05/2022, 16:50:40 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button

Description

The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin.

AI-Powered Analysis

AILast updated: 06/21/2025, 20:37:34 UTC

Technical Analysis

CVE-2022-3858 is a high-severity SQL Injection vulnerability (CWE-89) found in the WordPress plugin 'Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button' in versions prior to 3.0.3. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. This improper handling allows an authenticated user with at least admin privileges to inject malicious SQL code. Exploiting this flaw can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data, potentially compromising confidentiality, integrity, and availability of the affected WordPress site. The CVSS v3.1 base score is 7.2, reflecting a high severity with network attack vector, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the common use of WordPress and the plugin’s functionality that integrates multiple communication channels. Attackers leveraging this flaw could manipulate chat widget data or pivot to further compromise the hosting environment or connected systems. The vulnerability was reserved in November 2022 and publicly disclosed in December 2022, but no official patches or updates are linked, indicating that users must verify plugin versions and apply updates or mitigations promptly to prevent exploitation.

Potential Impact

For European organizations, this vulnerability can have serious consequences, especially for those relying on WordPress websites with this plugin to manage customer communications across multiple channels. Successful exploitation could lead to data breaches involving customer contact information, communication logs, or other sensitive data stored in the database. This can result in reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions if the website or chat functionality is impaired. Additionally, attackers could leverage the SQL injection to escalate privileges or deploy further malware, threatening broader IT infrastructure. Sectors such as e-commerce, public services, and enterprises with customer-facing portals are particularly at risk. The multi-channel nature of the plugin (Telegram, WeChat, SMS, email) increases the attack surface and potential for lateral movement. Given the high prevalence of WordPress in Europe and the critical role of customer engagement tools, the impact could be widespread if not addressed.

Mitigation Recommendations

1. Immediate verification of the plugin version is essential; upgrade to version 3.0.3 or later where the vulnerability is fixed. If an update is unavailable, consider disabling or removing the plugin until a patch is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to this plugin’s parameters to provide a temporary protective layer. 3. Restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., MFA) to reduce the risk of exploitation by compromised accounts. 4. Conduct regular security audits and database integrity checks to detect unauthorized changes. 5. Monitor logs for unusual database queries or plugin activity indicative of exploitation attempts. 6. Employ principle of least privilege for database users associated with WordPress to limit the impact of any injection. 7. Educate site administrators about the risks of installing plugins from unverified sources and encourage timely patch management. 8. Consider isolating the WordPress environment using containerization or segmentation to limit lateral movement if compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-04T08:38:15.505Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf57d9

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 8:37:34 PM

Last updated: 2/7/2026, 5:32:38 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats