Skip to main content

CVE-2025-45960: n/a

Medium
VulnerabilityCVE-2025-45960cvecve-2025-45960
Published: Fri Jul 25 2025 (07/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross Site Scripting vulnerability in tawk.to Live Chat v.1.6.1 allows a remote attacker to execute arbitrary code via the web application stores and displays user-supplied input without proper input validation or encoding

AI-Powered Analysis

AILast updated: 07/25/2025, 17:17:48 UTC

Technical Analysis

CVE-2025-45960 is a Cross Site Scripting (XSS) vulnerability identified in the tawk.to Live Chat application version 1.6.1. This vulnerability arises because the web application accepts user-supplied input and stores and displays it without proper input validation or output encoding. As a result, a remote attacker can inject malicious scripts that execute arbitrary code within the context of the victim's browser session. The vulnerability is classified as a stored XSS, meaning the malicious payload is saved on the server and served to other users, increasing the attack's reach and persistence. Exploiting this flaw could allow attackers to hijack user sessions, steal sensitive information such as cookies or authentication tokens, perform actions on behalf of users, or deliver further malware. The vulnerability does not require authentication or user interaction beyond visiting a compromised page or interacting with the chat widget. Although no known exploits are currently reported in the wild and no CVSS score has been assigned, the nature of stored XSS vulnerabilities typically represents a significant security risk. The lack of a patch link suggests that a fix may not yet be publicly available, underscoring the need for immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on the tawk.to Live Chat service to interact with customers or provide support. Exploitation could lead to unauthorized access to user accounts, leakage of personal data protected under GDPR, and damage to organizational reputation. Given the sensitivity of customer interactions and the potential for session hijacking, attackers could impersonate legitimate users or administrators, leading to fraudulent transactions or unauthorized data access. Additionally, the persistent nature of stored XSS increases the risk of widespread compromise across multiple users. This could also facilitate phishing attacks or malware distribution targeting European users. Organizations in sectors such as e-commerce, finance, healthcare, and public services, where live chat is commonly used, may face regulatory penalties if personal data is compromised due to this vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using tawk.to Live Chat version 1.6.1 or earlier and monitor for any official patches or updates from the vendor. In the absence of an official patch, immediate steps include implementing Web Application Firewall (WAF) rules to detect and block malicious input patterns associated with XSS attacks targeting the chat interface. Input sanitization and output encoding should be enforced at the application layer, either by customizing the chat widget if possible or by proxying chat traffic through a security gateway that performs these functions. Organizations should also conduct thorough security testing of their live chat implementation to identify and remediate any injection points. User education and awareness campaigns can help reduce the risk of successful social engineering attacks leveraging this vulnerability. Finally, monitoring logs for unusual activity related to the chat service and establishing incident response procedures specific to web application attacks will enhance preparedness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6883b8bfad5a09ad00538529

Added to database: 7/25/2025, 5:02:55 PM

Last enriched: 7/25/2025, 5:17:48 PM

Last updated: 7/26/2025, 6:03:40 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats