Dialogity Free Live Chat Vulnerability (Medium) – CVE-2025-57912

Dialogity Free Live Chat Vulnerability (Medium) – CVE-2025-57912

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-57912 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 4.4) affecting Dialogity Free Live Chat (WordPress plugin slug: dialogity-website-chat) in versions up to and including 1.0.3.

The attack requires an authenticated user with administrator-level access or higher to inject malicious script content that is then stored and executed when a page containing the injected content is viewed. According to the advisory, the issue only affects multisite installations and sites where unfiltered_html has been disabled, which can be common in more locked-down or compliance-driven environments.

Reference: CVE-2025-57912 record and Wordfence vulnerability advisory.

Security Weakness

The core weakness is insufficient input sanitization and output escaping in Dialogity Free Live Chat (<= 1.0.3). In practical terms, the plugin does not adequately prevent potentially dangerous content from being saved and later rendered in a way that the browser executes as code.

While the required permissions are high (administrator+), this still matters because administrator access can be obtained through credential theft, password reuse, social engineering, or a separate vulnerability in another plugin/theme. In multisite environments, the impact can feel amplified because administrative actions often influence multiple sites or users.

Technical or Business Impacts

Stored XSS can create meaningful business risk even at medium severity because it can undermine trust and session security. If exploited, scripts may run in a victim’s browser when they access an affected page, potentially enabling actions such as unauthorized changes performed in the user’s session or data exposure within the context of what the user can access.

For marketing directors and executives, the practical impacts often include brand damage (malicious pop-ups/redirects on site pages), campaign disruption (tampered landing pages or analytics interference), and compliance concerns if user-facing experiences are manipulated in a way that affects disclosures, consent flows, or customer communications. Even when the initial attacker needs administrator access, the resulting scripts can target other privileged users who view the compromised content.

Remediation: Update Dialogity Free Live Chat to version 1.0.4 or a newer patched version, as recommended in the advisory.

Similar Attacks

Stored XSS has been used to spread rapidly and damage user trust because it executes in real users’ browsers when they view compromised content. A few well-known examples include:

WordPress Core: CVE-2019-8942 (stored XSS issue documented in WordPress core security history)

MySpace “Samy” worm (a classic stored XSS event that propagated through user profiles)

2010 Twitter “onMouseOver” worm (XSS-driven spread affecting user accounts and timelines)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers