CVE-2023-3667: CWE-79 Cross-Site Scripting (XSS) in Unknown Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget
The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2023-3667 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin "Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget," specifically in versions prior to 1.1.9. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and later executed in the context of other users' browsers. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires high privileges, and user interaction is needed to trigger the malicious script. The impact includes limited confidentiality and integrity compromise but no direct availability impact. The vulnerability affects the confidentiality and integrity of data by enabling script execution that could steal session tokens, perform actions on behalf of users, or manipulate displayed content. No known exploits are reported in the wild, and no official patches or updates are linked yet, indicating that users should be cautious and implement mitigations proactively.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using this specific WordPress plugin for customer support chat integration. Exploitation could lead to session hijacking, unauthorized actions performed by administrators or other users, and potential data leakage through malicious scripts. Given that the vulnerability requires high privilege access to inject the payload, the initial compromise vector is likely limited to insiders or attackers who have already gained administrative access. However, once exploited, the stored XSS can affect multiple users, including site administrators and visitors, potentially leading to broader compromise of site integrity and user trust. Organizations in sectors with high customer interaction via web chat—such as e-commerce, financial services, and public services—may face reputational damage and regulatory scrutiny under GDPR if personal data is exposed or manipulated. The lack of a patch increases the urgency for mitigation, especially for sites with multisite WordPress configurations common in large enterprises and service providers across Europe.
Mitigation Recommendations
1. Immediate mitigation includes restricting administrative access to trusted personnel only and auditing current admin accounts for suspicious activity. 2. Disable or remove the vulnerable plugin until a patched version is released. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting the plugin’s settings fields. 4. Harden WordPress installations by enforcing the principle of least privilege, ensuring only necessary users have admin rights. 5. Monitor logs for unusual input patterns or script injections in plugin settings. 6. Educate administrators on the risks of injecting untrusted content into plugin configurations. 7. Regularly check for updates from the plugin vendor or WordPress security advisories to apply patches promptly once available. 8. Consider alternative, well-maintained chat plugins with robust security practices if continued chat functionality is critical.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-3667: CWE-79 Cross-Site Scripting (XSS) in Unknown Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget
Description
The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2023-3667 is a stored Cross-Site Scripting (XSS) vulnerability identified in the WordPress plugin "Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget," specifically in versions prior to 1.1.9. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and later executed in the context of other users' browsers. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the attack vector is network-based (remote), requires high privileges, and user interaction is needed to trigger the malicious script. The impact includes limited confidentiality and integrity compromise but no direct availability impact. The vulnerability affects the confidentiality and integrity of data by enabling script execution that could steal session tokens, perform actions on behalf of users, or manipulate displayed content. No known exploits are reported in the wild, and no official patches or updates are linked yet, indicating that users should be cautious and implement mitigations proactively.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to websites using this specific WordPress plugin for customer support chat integration. Exploitation could lead to session hijacking, unauthorized actions performed by administrators or other users, and potential data leakage through malicious scripts. Given that the vulnerability requires high privilege access to inject the payload, the initial compromise vector is likely limited to insiders or attackers who have already gained administrative access. However, once exploited, the stored XSS can affect multiple users, including site administrators and visitors, potentially leading to broader compromise of site integrity and user trust. Organizations in sectors with high customer interaction via web chat—such as e-commerce, financial services, and public services—may face reputational damage and regulatory scrutiny under GDPR if personal data is exposed or manipulated. The lack of a patch increases the urgency for mitigation, especially for sites with multisite WordPress configurations common in large enterprises and service providers across Europe.
Mitigation Recommendations
1. Immediate mitigation includes restricting administrative access to trusted personnel only and auditing current admin accounts for suspicious activity. 2. Disable or remove the vulnerable plugin until a patched version is released. 3. Implement Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting the plugin’s settings fields. 4. Harden WordPress installations by enforcing the principle of least privilege, ensuring only necessary users have admin rights. 5. Monitor logs for unusual input patterns or script injections in plugin settings. 6. Educate administrators on the risks of injecting untrusted content into plugin configurations. 7. Regularly check for updates from the plugin vendor or WordPress security advisories to apply patches promptly once available. 8. Consider alternative, well-maintained chat plugins with robust security practices if continued chat functionality is critical.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-07-13T18:34:15.748Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc728
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:43:09 AM
Last updated: 8/15/2025, 8:30:54 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.