Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13613: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in marcinlawrowski Wise Chat

0
High
VulnerabilityCVE-2024-13613cvecve-2024-13613cwe-200
Published: Sat May 17 2025 (05/17/2025, 11:17:17 UTC)
Source: CVE
Vendor/Project: marcinlawrowski
Product: Wise Chat

Description

The Wise Chat plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.3 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments included in chat messages. The vulnerability was partially patched in version 3.3.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:01:04 UTC

Technical Analysis

CVE-2024-13613 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Wise Chat plugin for WordPress, developed by marcinlawrowski. The flaw exists in all versions up to and including 3.3.3, where sensitive data such as file attachments included in chat messages are stored insecurely within the /wp-content/uploads directory. This directory is typically accessible via the web server, and due to insufficient access controls, unauthenticated attackers can directly retrieve these files without any authentication or user interaction. The vulnerability stems from the plugin’s failure to properly restrict access to uploaded files, exposing potentially sensitive information to anyone with network access to the WordPress site. The issue was partially addressed in version 3.3.3, but earlier versions remain vulnerable. The CVSS v3.1 score is 7.5 (high severity), reflecting the ease of exploitation (network attack vector, no privileges required, no user interaction) and the high impact on confidentiality. Integrity and availability are not impacted. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk given the sensitive nature of chat attachments and the widespread use of WordPress and its plugins. The vulnerability was publicly disclosed in May 2025 and is tracked by Wordfence and CISA.

Potential Impact

The primary impact of CVE-2024-13613 is the unauthorized disclosure of sensitive information, which can include private chat attachments such as documents, images, or other files shared within the Wise Chat plugin. This exposure can lead to privacy violations, data leakage, and potential compliance breaches for organizations handling sensitive or regulated data. Attackers can exploit this vulnerability remotely without authentication, increasing the risk of mass data exposure on affected WordPress sites. While the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can damage organizational reputation, lead to legal consequences, and facilitate further attacks such as social engineering or targeted phishing campaigns. Organizations relying on Wise Chat for internal or external communications are particularly vulnerable. The lack of known exploits in the wild suggests limited active exploitation currently, but the ease of access and high impact on confidentiality make this a critical issue to address promptly.

Mitigation Recommendations

To mitigate CVE-2024-13613, organizations should immediately update the Wise Chat plugin to the latest available version beyond 3.3.3 where the vulnerability is partially patched or fully resolved. If updating is not immediately possible, restrict direct access to the /wp-content/uploads directory by implementing web server access controls such as .htaccess rules or equivalent configurations to prevent unauthorized file retrieval. Additionally, review and enforce strict file upload policies, including scanning uploaded files for sensitive content and limiting file types and sizes. Employ security plugins or web application firewalls (WAFs) that can detect and block suspicious requests targeting the uploads directory. Regularly audit the contents of the uploads directory for sensitive or unintended files and remove any unnecessary data. Finally, monitor web server logs for unusual access patterns that may indicate exploitation attempts. Educate site administrators on secure plugin management and the importance of timely updates to reduce exposure to known vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-22T01:01:46.932Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb6f9

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/28/2026, 12:01:04 PM

Last updated: 3/25/2026, 1:37:47 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses