CVE-2026-27954

Source
https://cve.org/CVERecord?id=CVE-2026-27954
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27954.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27954
Aliases
  • GHSA-87wc-2p86-h3w7
Published
2026-02-26T01:42:38.225Z
Modified
2026-03-03T02:56:50.060038Z
Severity
  • 4.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
LiveHelperChat has department-level authorization bypass in holdaction, blockuser, and transferchat endpoints
Details

Live Helper Chat is an open-source application that enables live support websites. In versions up to and including 4.52, three chat action endpoints (holdaction.php, blockuser.php, and transferchat.php) load chat objects by ID without calling erLhcoreClassChat::hasAccessToRead(), allowing operators to act on chats in departments they are not assigned to. Operators with the relevant role permissions (holduse, allowblockusers, allowtransfer) can hold, block users from, or transfer chats in departments they are not assigned to. This is a horizontal privilege escalation within one organization. As of time of publication, no known patched versions are available.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27954.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-862"
    ]
}
References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27954.json"