Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-2577 | Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0. |
Wed, 29 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:chatwoot:chatwoot:*:*:*:*:*:*:*:* |
Thu, 09 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Jan 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0. | |
| Title | Chatwoot has a Blind SQL-injection in Conversation and Contacts filters | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-09T18:10:11.074Z
Reserved: 2024-12-29T03:00:24.715Z
Link: CVE-2025-21628
Updated: 2025-01-09T18:10:02.721Z
Status : Analyzed
Published: 2025-01-09T18:15:30.070
Modified: 2025-10-29T14:52:40.483
Link: CVE-2025-21628
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:26:21Z
EUVD