Cyber Posture

CVE-2025-21628

Critical

Published: 09 January 2025

Published
09 January 2025
Modified
29 October 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
EPSS Score 0.0050 65.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.

Security Summary

CVE-2025-21628 is a SQL injection vulnerability (CWE-89) in Chatwoot, an open-source customer engagement suite. Versions prior to 3.16.0 are affected, specifically the conversation and contact filters endpoints. These endpoints fail to sanitize the query_operator input received from the frontend or API, enabling attackers to inject arbitrary SQL by appending a tautological WHERE clause to the filter query. The vulnerability was published on 2025-01-09 and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L).

Any authenticated actor with low privileges can exploit this issue remotely over the network, requiring low complexity and no user interaction. Exploitation allows execution of arbitrary SQL queries within the filter context, resulting in scope-changed impacts: high confidentiality loss (e.g., data exfiltration), low integrity modification, and low availability disruption.

Chatwoot patched the vulnerability in version 3.16.0. Mitigation details are available in the security advisory at https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9 and the fixing commit at https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b.

Details

CWE(s)
CWE-89

Affected Products

chatwoot
chatwoot
2.16.1 — 3.16.0

References