Group Chat & Video Chat by AtomChat Vulnerability (Medium) – CVE-20…

Group Chat & Video Chat by AtomChat Vulnerability (Medium) – CVE-20…

by | Apr 15, 2026 | Plugins

Attack Vectors

AtomChat (Group Chat & Video Chat by AtomChat) version 1.1.7 and earlier has a Medium-severity authorization issue (CVE-2025-31831, CVSS 4.3) where a function is missing a capability check. In practical terms, this means an attacker does not need admin access to attempt misuse—only an authenticated WordPress account.

The primary exposure is any site that allows user registration or has multiple user roles (for example, Subscriber accounts for gated content, membership programs, events, or partner portals). According to the advisory, authenticated attackers with Subscriber-level access and above can trigger an unauthorized action without user interaction.

Security Weakness

The root cause is a missing authorization (capability) check in a plugin function in AtomChat versions up to and including 1.1.7. Capability checks are a core WordPress control used to ensure only approved roles can perform sensitive actions.

When these checks are absent or incomplete, standard role-based access controls can be bypassed by lower-privileged users who should not be able to perform the affected action. This is why issues like CVE-2025-31831 often become especially relevant for organizations that rely on large numbers of low-privilege accounts (customers, members, students, or contractors).

Technical or Business Impacts

While the published severity is Medium, the business risk can be meaningful depending on how your organization uses WordPress accounts and how widely user registration is enabled. The advisory indicates unauthorized actions can be performed by authenticated users, which can lead to operational disruption, policy violations, or misuse of site functionality.

From a business perspective, potential impacts include reduced trust in your customer/member experience, increased support burden investigating abnormal user behavior, and compliance concerns if unauthorized actions affect processes tied to user access and audit trails. This is particularly relevant for marketing teams running community programs, gated experiences, or campaigns that encourage account creation.

Recommended remediation: Update Group Chat & Video Chat by AtomChat to version 1.1.8 or newer (patched). Reference: CVE-2025-31831 and the vendor/advisory details at Wordfence Threat Intel.

Similar Attacks

Authorization and capability-check gaps are a common theme in WordPress plugin incidents. For context, here are a few real examples of similar categories of issues that have been broadly discussed in the WordPress security ecosystem:

CVE-2024-27956 (WP Automatic)
CVE-2023-2745 (Essential Addons for Elementor)
CVE-2021-29447 (WordPress core media issue)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers