CVE-2025-21628
Published: 09 January 2025
Description
Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.
Security Summary
CVE-2025-21628 is a SQL injection vulnerability (CWE-89) in Chatwoot, an open-source customer engagement suite. Versions prior to 3.16.0 are affected, specifically the conversation and contact filters endpoints. These endpoints fail to sanitize the query_operator input received from the frontend or API, enabling attackers to inject arbitrary SQL by appending a tautological WHERE clause to the filter query. The vulnerability was published on 2025-01-09 and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L).
Any authenticated actor with low privileges can exploit this issue remotely over the network, requiring low complexity and no user interaction. Exploitation allows execution of arbitrary SQL queries within the filter context, resulting in scope-changed impacts: high confidentiality loss (e.g., data exfiltration), low integrity modification, and low availability disruption.
Chatwoot patched the vulnerability in version 3.16.0. Mitigation details are available in the security advisory at https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9 and the fixing commit at https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b.
Details
- CWE(s)