| Título | chatwoot 4.11.1 Business Logic Errors |
|---|
| Descrição | Summary
The Chatwoot contains a business logic vulnerability that allows attackers to bypass the intended signup restriction mechanism.
The application checks the response from the server (signupEnabled - Chatwoot config value) to determine whether new user registration is permitted. By intercepting and modifying the server response (using a proxy tool such as Burp Suite), an attacker can change the value of signupEnabled from false to true.
Because the server does not properly enforce this restriction with server-side validation, the manipulated value is accepted, allowing unauthorized users to register accounts (administrative) even when the signup functionality is intended to be disabled.
Details
Vulnerable Endpoint:
GET /app/login HTTP/2
Host: chatwoot.example.com |
|---|
| Utilizador | Zabi_Ullah (UID 96130) |
|---|
| Submissão | 05/03/2026 07h35 (há 1 mês) |
|---|
| Moderação | 27/03/2026 14h48 (22 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 353877 [chatwoot até 4.11.1 Signup Endpoint /app/login signupEnabled Elevação de Privilégios] |
|---|
| Pontos | 17 |
|---|