Browse all 3 CVE security advisories affecting Team AtomChat. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Team AtomChat develops real-time communication platforms with a core focus on secure messaging solutions. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and authentication flaws. While no major public security incidents have been documented, the three CVEs on record highlight persistent issues in their access control mechanisms and secure coding practices. Their security posture suggests a need for enhanced input sanitization and robust session management to mitigate risks associated with their real-time communication infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-31831 | WordPress AtomChat plugin <= 1.1.7 - Broken Access Control vulnerability — AtomChatCWE-862 | 4.3 | Medium | 2025-04-01 |
| CVE-2025-31532 | WordPress AtomChat plugin <= 1.1.8 - Cross Site Scripting (XSS) vulnerability — AtomChatCWE-79 | 6.5 | Medium | 2025-03-31 |
| CVE-2023-46606 | WordPress AtomChat plugin <= 1.1.4 - Broken Access Control vulnerability — AtomChatCWE-862 | 5.3 | Medium | 2025-01-02 |
This page lists every published CVE security advisory associated with Team AtomChat. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.