Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31383: Cross-Site Request Forgery (CSRF) in sodena FrescoChat Live Chat

0
Unknown
VulnerabilityCVE-2025-31383cvecve-2025-31383
Published: Wed Apr 09 2025 (04/09/2025, 16:13:33 UTC)
Source: CVE Database V5
Vendor/Project: sodena
Product: FrescoChat Live Chat

Description

Cross-Site Request Forgery (CSRF) vulnerability in sodena FrescoChat Live Chat flexytalk-widget allows Stored XSS.This issue affects FrescoChat Live Chat: from n/a through <= 3.2.6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 01:06:05 UTC

Technical Analysis

CVE-2025-31383 identifies a security vulnerability in the sodena FrescoChat Live Chat product, specifically within the flexytalk-widget component. The vulnerability is a Cross-Site Request Forgery (CSRF) that enables Stored Cross-Site Scripting (XSS) attacks. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests to a web application, leveraging the victim's credentials and session. In this case, the CSRF flaw facilitates the injection of malicious scripts that are stored persistently within the chat interface, leading to Stored XSS. Stored XSS is particularly dangerous because the malicious payload is saved on the server and served to multiple users, potentially compromising their browsers, stealing session tokens, or performing actions on their behalf. The affected versions include all releases up to 3.2.6, with no fixed version currently indicated. No public exploits have been reported, but the vulnerability is publicly disclosed and should be considered exploitable. The lack of a CVSS score requires an assessment based on the nature of the vulnerability: the combination of CSRF and Stored XSS can lead to significant confidentiality, integrity, and availability impacts, especially in environments where FrescoChat is used for customer interaction or internal communication. The vulnerability was reserved in late March 2025 and published in early April 2025 by Patchstack. No patches or mitigation links are currently provided, indicating that users must rely on other defensive measures until an official fix is released.

Potential Impact

The impact of CVE-2025-31383 is substantial for organizations using FrescoChat Live Chat, particularly those relying on it for customer support or internal communication. Exploitation of this vulnerability can lead to unauthorized actions performed on behalf of authenticated users due to CSRF, combined with persistent malicious script injection via Stored XSS. This can result in session hijacking, credential theft, defacement, or spreading malware to users interacting with the chat widget. The persistent nature of Stored XSS increases the attack surface and duration of exposure, potentially affecting multiple users over time. Confidentiality is at risk as attackers may steal sensitive information; integrity is compromised through unauthorized actions or data manipulation; availability could be affected if attackers disrupt chat services or inject disruptive scripts. The absence of known exploits in the wild reduces immediate risk but does not diminish the potential for targeted attacks, especially against high-value organizations. The scope includes all users interacting with the vulnerable chat widget, which may be extensive depending on deployment scale. Organizations with high customer interaction volumes or sensitive communications are particularly vulnerable.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, apply strict Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the chat widget context. Second, implement anti-CSRF tokens or verify the Origin and Referer headers on requests to the chat widget to prevent unauthorized cross-site requests. Third, sanitize and validate all user inputs rigorously on the server side to prevent injection of malicious scripts. Fourth, consider temporarily disabling or restricting the FrescoChat Live Chat widget on critical systems or sensitive pages until a fix is available. Fifth, monitor web server and application logs for unusual requests or patterns indicative of CSRF or XSS exploitation attempts. Finally, educate users and administrators about the risks and signs of exploitation. Once a patch is available, prioritize immediate deployment. Additionally, consider deploying Web Application Firewalls (WAFs) with rules targeting CSRF and XSS attack patterns specific to FrescoChat.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-28T10:59:17.384Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7345e6bfc5ba1def1701

Added to database: 4/1/2026, 7:34:29 PM

Last enriched: 4/2/2026, 1:06:05 AM

Last updated: 4/6/2026, 9:27:48 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses