{"id":"CVE-2025-21628","summary":"Chatwoot has a Blind SQL-injection in Conversation and Contacts filters","details":"Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0.","aliases":["GHSA-g8f9-hh83-rcq9"],"modified":"2026-04-17T04:26:00.367634Z","published":"2025-01-09T17:10:05.301Z","database_specific":{"cwe_ids":["CWE-89"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21628.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21628.json"},{"type":"ADVISORY","url":"https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21628"},{"type":"FIX","url":"https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/chatwoot/chatwoot","events":[{"introduced":"18c5c478367e50250a8b147d52ad2bd69ed4ef49"},{"fixed":"d01c7d3fa759de388bbc5bb6eb2f5407f0300a98"},{"fixed":"b34dac7bbe3c910186083b680e51aad5ea60b44b"}],"database_specific":{"versions":[{"introduced":"2.16.1"},{"fixed":"3.16.0"}]}}],"versions":["2.16.1","v2.17.0","v2.17.1","v2.18.0","v3.0.0","v3.1.0","v3.1.1","v3.10.0","v3.10.1","v3.10.2","v3.11.0","v3.11.1","v3.12.0","v3.13.0","v3.14.0","v3.14.1","v3.15.0","v3.2.0","v3.3.0","v3.3.1","v3.4.0","v3.5.0","v3.5.1","v3.5.2","v3.6.0","v3.7.0","v3.8.0","v3.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21628.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L"}]}