Skip to main content

CVE-2022-3858: CWE-89 SQL Injection in Unknown Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button

High
VulnerabilityCVE-2022-3858cvecve-2022-3858cwe-89-sql-injection
Published: Mon Dec 05 2022 (12/05/2022, 16:50:40 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button

Description

The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin.

AI-Powered Analysis

AILast updated: 06/21/2025, 20:37:34 UTC

Technical Analysis

CVE-2022-3858 is a high-severity SQL Injection vulnerability (CWE-89) found in the WordPress plugin 'Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button' in versions prior to 3.0.3. The vulnerability arises because the plugin fails to properly sanitize and escape user-supplied input before incorporating it into SQL queries. This improper handling allows an authenticated user with at least admin privileges to inject malicious SQL code. Exploiting this flaw can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data, potentially compromising confidentiality, integrity, and availability of the affected WordPress site. The CVSS v3.1 base score is 7.2, reflecting a high severity with network attack vector, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the common use of WordPress and the plugin’s functionality that integrates multiple communication channels. Attackers leveraging this flaw could manipulate chat widget data or pivot to further compromise the hosting environment or connected systems. The vulnerability was reserved in November 2022 and publicly disclosed in December 2022, but no official patches or updates are linked, indicating that users must verify plugin versions and apply updates or mitigations promptly to prevent exploitation.

Potential Impact

For European organizations, this vulnerability can have serious consequences, especially for those relying on WordPress websites with this plugin to manage customer communications across multiple channels. Successful exploitation could lead to data breaches involving customer contact information, communication logs, or other sensitive data stored in the database. This can result in reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions if the website or chat functionality is impaired. Additionally, attackers could leverage the SQL injection to escalate privileges or deploy further malware, threatening broader IT infrastructure. Sectors such as e-commerce, public services, and enterprises with customer-facing portals are particularly at risk. The multi-channel nature of the plugin (Telegram, WeChat, SMS, email) increases the attack surface and potential for lateral movement. Given the high prevalence of WordPress in Europe and the critical role of customer engagement tools, the impact could be widespread if not addressed.

Mitigation Recommendations

1. Immediate verification of the plugin version is essential; upgrade to version 3.0.3 or later where the vulnerability is fixed. If an update is unavailable, consider disabling or removing the plugin until a patch is released. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns related to this plugin’s parameters to provide a temporary protective layer. 3. Restrict admin access strictly to trusted personnel and enforce strong authentication mechanisms (e.g., MFA) to reduce the risk of exploitation by compromised accounts. 4. Conduct regular security audits and database integrity checks to detect unauthorized changes. 5. Monitor logs for unusual database queries or plugin activity indicative of exploitation attempts. 6. Employ principle of least privilege for database users associated with WordPress to limit the impact of any injection. 7. Educate site administrators about the risks of installing plugins from unverified sources and encourage timely patch management. 8. Consider isolating the WordPress environment using containerization or segmentation to limit lateral movement if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-11-04T08:38:15.505Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf57d9

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 8:37:34 PM

Last updated: 8/10/2025, 1:32:08 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats