Chatbot for WordPress by Collect.chat ⚡️ Vulnerability (Medium) – C…

Chatbot for WordPress by Collect.chat ⚡️ Vulnerability (Medium) – C…

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-0736 affects the Chatbot for WordPress by Collect.chat ⚡️ plugin (slug: collectchat) in versions up to and including 2.4.8. The reported severity is Medium (CVSS 6.4).

The risk comes from an attacker who already has an authenticated WordPress account with Contributor-level access or higher. In practical terms, this can include internal users, contractors, agencies, or any account taken over through password reuse or phishing.

An attacker can inject a hidden script into a page by placing it in a specific post metadata field. That script can then run automatically whenever anyone visits the affected page, including executives, marketing team members, and site administrators.

Security Weakness

Wordfence reports that the plugin is vulnerable to Stored Cross-Site Scripting (Stored XSS) through the _inpost_head_script[synth_header_script] post meta field due to insufficient input sanitization and output escaping.

Stored XSS matters because the malicious content is saved in your site and delivered to visitors as part of normal browsing. This can turn a single compromised user account into a persistent problem that impacts many visitors and teams over time.

There is no known patch available at the time of the referenced advisory. This shifts the decision from “update and move on” to a risk-management choice about mitigation and potential replacement.

Technical or Business Impacts

For business leaders, the primary concern is that injected scripts can change what users see and do on your site. This can lead to brand damage (defaced pages or unwanted pop-ups), loss of customer trust, and campaign performance impacts if landing pages are altered or visitors are redirected.

Depending on what the injected script does, it may also support account misuse (for example, stealing session information in some circumstances), interfering with forms and tracking, or quietly rewriting calls-to-action. Even if the vulnerability is rated Medium, the real-world impact can be higher when it affects high-traffic pages, executive logins, or regulated customer journeys.

Recommended actions (given no patch): consider uninstalling Chatbot for WordPress by Collect.chat ⚡️ and replacing it with a vetted alternative; reduce WordPress role access (limit Contributor accounts and review who has content-editing privileges); audit recent content changes and post meta where feasible; and increase monitoring for unexpected page changes. Choose mitigations based on your organization’s risk tolerance and compliance obligations.

Similar Attacks

While this issue is specific to WordPress, script injection has been used in major real-world incidents to manipulate what visitors see and to steal data at scale. Examples include:

British Airways breach (2018) — attackers injected code to skim payment details

Ticketmaster breach (2018) — third-party script compromise tied to payment card theft

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers