XSS Alert: How LiveHelperChat 4.61 Invites JavaScript Shenanigans with Chat Transfer!
Discover how a stored cross-site scripting vulnerability in Live Helper Chat version ≤ 4.61 can turn chat transfers into a comedy of errors. By injecting a crafty payload into the Operator Chat Name Field, attackers can execute arbitrary JavaScript during chat transfers, proving once again that even chat support needs a little more security love.

Hot Take:
Looks like LiveHelperChat decided to play the role of the unintentional “helper” by hosting a guest appearance of everyone’s least favorite character, XSS! The chat transfer function is now doubling as a surprise JavaScript party planner. It’s like trying to send a friendly note and instead delivering a digital glitter bomb. Who knew chats could be this “interactive?”
Key Points:
- Exploited through the Operator Chat Name Field during chat transfer.
- Vulnerability affects LiveHelperChat versions ≤ 4.61.
- Allows execution of arbitrary JavaScript via crafted payload.
- Patched in version 4.61—time to update!
- Tested on Mac OS Sequoia 15.5 using Firefox.
Already a member? Log in here