CVE-2024-13613
Wise Chat <= 3.3.3 - Unauthenticated Sensitive Information Exposure Through Unprotected Directory
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
The Wise Chat plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.3 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments included in chat messages. The vulnerability was partially patched in version 3.3.3.
| CWE | CWE-200 |
| Vendor | marcinlawrowski |
| Product | wise chat |
| Published | May 17, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for marcinlawrowski wise chat
Be the first to know when new high vulnerabilities affecting marcinlawrowski wise chat are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
marcinlawrowski / Wise Chat
0 โค 3.3.2
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/f70dabb4-3ae6-43cf-86e2-62ac1454b697?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wise-chat/trunk/src/services/WiseChatAttachmentsService.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3268074/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3288680/
Credits
Tim Coen