Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8349: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Tawk Live Chat

0
Medium
VulnerabilityCVE-2025-8349cvecve-2025-8349cwe-79
Published: Mon Oct 20 2025 (10/20/2025, 09:56:03 UTC)
Source: CVE Database V5
Vendor/Project: Tawk
Product: Live Chat

Description

Cross-site Scripting (XSS) stored vulnerability in Tawk Live Chat. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by uploading a malicious PDF with JavaScript payload through the chatbot. The PDF is stored by the application and subsequently displayed without proper sanitisation when other users access it. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 00:27:30 UTC

Technical Analysis

CVE-2025-8349 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 affecting the Tawk Live Chat product. The flaw occurs because the application fails to properly neutralize input when generating web pages, specifically when handling uploaded PDF files containing embedded JavaScript payloads. An attacker can exploit this by uploading a malicious PDF through the chatbot interface, which the system stores and later displays to other users without adequate sanitization. When victims access the chat interface and the malicious PDF is rendered, the embedded JavaScript executes in their browsers. This can lead to session hijacking, data theft, or unauthorized actions performed with the victim's privileges. The vulnerability requires no authentication or privileges to exploit but does require user interaction (viewing the malicious content). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N) reflects network attack vector, low attack complexity, no privileges or authentication, user interaction needed, and limited scope and impact confined to integrity and confidentiality. No patches or known exploits are currently documented, but the vulnerability poses a moderate risk due to the widespread use of Tawk Live Chat in customer support and engagement scenarios.

Potential Impact

The primary impact of CVE-2025-8349 is the compromise of user confidentiality and integrity through execution of arbitrary JavaScript in victim browsers. Attackers can steal session cookies, enabling account takeover or impersonation, and perform unauthorized actions on behalf of users, potentially leading to data leakage or manipulation. Since Tawk Live Chat is widely integrated into websites for real-time customer interaction, exploitation could affect a large number of end users and organizations relying on this service for support. The vulnerability could also be leveraged as an initial vector for further attacks, such as phishing or spreading malware. Although the CVSS score is medium, the ease of exploitation (no authentication required) and the potential for sensitive data exposure make this a significant concern for organizations using the affected product. The absence of known exploits in the wild suggests limited current active exploitation but does not preclude future attacks once the vulnerability becomes publicly known.

Mitigation Recommendations

Organizations should implement strict input validation and sanitization on all uploaded files, especially PDFs, to prevent embedded scripts from executing. Employ server-side scanning and filtering of uploaded content to detect and block malicious payloads. Update or patch the Tawk Live Chat product as soon as vendor fixes become available. In the interim, consider disabling file upload features or restricting uploads to trusted users only. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Monitor logs for unusual upload activity or access patterns indicative of exploitation attempts. Educate users to be cautious when interacting with chat attachments and report suspicious content. Additionally, isolate the chat application environment to minimize potential lateral movement if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-07-30T11:11:57.246Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f6093ced66740820aae006

Added to database: 10/20/2025, 10:04:44 AM

Last enriched: 3/25/2026, 12:27:30 AM

Last updated: 5/10/2026, 6:03:04 AM

Views: 168

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses