CVE-2021-24914 Detail

Current Description

The Tawk.To Live Chat WordPress plugin before 0.6.0 does not have capability and CSRF checks in the tawkto_setwidget and tawkto_removewidget AJAX actions, available to any authenticated user. The first one allows low-privileged users (including simple subscribers) to change the ‘tawkto-embed-widget-page-id’ and ‘tawkto-embed-widget-widget-id’ parameters. Any authenticated user can thus link the vulnerable website to their own Tawk.to instance. Consequently, they will be able to monitor the vulnerable website and interact with its visitors (receive contact messages, answer, …). They will also be able to display an arbitrary Knowledge Base. The second one will remove the live chat widget from pages.

View Analysis Description

Analysis Description

The Tawk.To Live Chat WordPress plugin before 0.6.0 does not have capability and CSRF checks in the tawkto_setwidget and tawkto_removewidget AJAX actions, available to any authenticated user. The first one allows low-privileged users (including simple subscribers) to change the ‘tawkto-embed-widget-page-id’ and ‘tawkto-embed-widget-widget-id’ parameters. Any authenticated user can thus link the vulnerable website to their own Tawk.to instance. Consequently, they will be able to monitor the vulnerable website and interact with its visitors (receive contact messages, answer, …). They will also be able to display an arbitrary Knowledge Base. The second one will remove the live chat widget from pages.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-862 Missing Authorization WPScan  

Change History

1 change records found show changes

Initial Analysis 12/06/2021 4:08:00 PM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:tawk:tawk.to_live_chat:*:*:*:*:*:wordpress:*:* versions up to (excluding) 0.6.0
Added CVSS V2
NIST (AV:N/AC:M/Au:S/C:P/I:P/A:P)
Added CVSS V2 Metadata
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1
NIST AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Changed Reference Type
https://wpscan.com/vulnerability/39392055-8cd3-452f-8bcb-a650f5bddc2e No Types Assigned
https://wpscan.com/vulnerability/39392055-8cd3-452f-8bcb-a650f5bddc2e Exploit, Third Party Advisory

Quick Info

CVE Dictionary Entry:
CVE-2021-24914
NVD Published Date:
12/06/2021
NVD Last Modified:
12/06/2021
Source:
WPScan