{"uuid": "77585484-7297-4176-8ae3-292b70a8a853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-26776", "type": "seen", "source": "https://t.me/cybersecplayground/125", "content": "\ud83d\udea8 Critical Zero-Day in Chaty Pro Plugin \u2013 CVE-2025-26776 \ud83d\udea8\n\n\ud83d\udd34 Severity: 10.0 (Critical)\n\ud83d\udd34 Vulnerability: Unrestricted File Upload\n\ud83d\udd34 Impact: Full website takeover via malicious file execution\n\n\u26a0\ufe0f What\u2019s the Risk?\nThe Chaty Pro Plugin is affected by a dangerous file upload vulnerability, allowing attackers to:\n\ud83d\udd25 Upload and execute malicious PHP scripts\n\ud83d\udd25 Gain remote access &amp; escalate privileges\n\ud83d\udd25 Modify or delete website data\n\ud83d\udd25 Deploy web shells for persistent control\n\n\ud83d\udd0d How to Detect Affected Sites?\n\ud83d\udd17 Netlas.io\n\ud83d\udc49\ud83c\udffb Query : http.body:\"plugins/chaty-pro\"\n\n\n\ud83d\udca1 Manual Check:\n1\ufe0f\u20e3 Inspect /wp-content/uploads/chaty/ for suspicious files\n2\ufe0f\u20e3 Review server logs for unexpected file upload activity\n3\ufe0f\u20e3 Ensure the plugin is updated to the latest patched version\n\n\ud83d\ude80 Mitigation Steps\n\u2705 Update Chaty Pro Plugin to the latest security patch\n\u2705 Restrict file upload permissions (only allow safe file types)\n\u2705 Monitor /uploads/ directory for unauthorized files\n\u2705 Implement a Web Application Firewall (WAF)\n\n\ud83d\udcf0 Stay Tuned for more information and poc\n\n\ud83d\udce2 Protect your website today! Join us \ud83d\udc49 @cybersecplayground\n\n#WordPress #ChatyPro #CyberSecurity #WebSecurity #Pentesting", "creation_timestamp": "2025-03-06T23:30:03.000000Z"}