TalkJS Vulnerability (Medium) – CVE-2026-1055

TalkJS Vulnerability (Medium) – CVE-2026-1055

by | Feb 18, 2026 | Plugins

Attack Vectors

TalkJS (WordPress plugin slug: talkjs) versions 0.1.15 and earlier are affected by a Medium-severity vulnerability (CVE-2026-1055, CVSS 4.4) that allows stored cross-site scripting (XSS) through an administrator settings field named welcomeMessage.

The attacker must already be authenticated with Administrator (or higher) permissions, and the injected script can be stored via the plugin’s admin settings and then executed when a user later visits a page where that stored content is rendered.

Important scope note: this issue only affects (1) WordPress multisite installations and (2) sites where unfiltered_html has been disabled. If neither condition applies, the risk exposure described here may not be applicable.

Security Weakness

The core weakness is insufficient input sanitization and output escaping for the welcomeMessage parameter in TalkJS admin settings. In practical terms, this means the plugin may accept content that should be treated as untrusted and later display it in a way that can be interpreted as active script by a browser.

Because the injection is stored, the business risk is not limited to a one-time click. The malicious content can persist and execute repeatedly whenever affected pages are accessed, until it is removed.

Technical or Business Impacts

While this vulnerability requires Administrator-level access, it still matters for leadership teams because it can amplify damage from common real-world scenarios such as stolen admin credentials, malicious insiders, or a compromised administrator account in a multisite environment.

Potential impacts include: unauthorized actions performed in a user’s browser session (which can lead to content changes or configuration tampering), brand and customer trust erosion if visitors experience unexpected behavior, and increased compliance and incident-response burden if the injected script is used to capture sensitive information displayed in the browser.

Severity context: this issue is rated Medium (CVSS 4.4), but your organization’s practical risk may be higher in multisite environments where a single compromised admin account can affect multiple properties, brands, or business units.

Remediation status: there is no known patch available at this time. Based on the published guidance, you should review details carefully and apply mitigations aligned to your risk tolerance, which may include uninstalling TalkJS and selecting a replacement, tightening administrative access, and monitoring admin-setting changes for unexpected modifications.

References: CVE-2026-1055 (cve.org) and Wordfence advisory source.

Similar Attacks

Stored XSS is a widely abused pattern in WordPress and web applications because it can persist until discovered and removed. Examples of publicly documented stored-XSS issues include Elementor (Wordfence write-up) and Contact Form 7 (Wordfence write-up), which illustrate how script injection in plugin workflows can translate into business-impacting incidents.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers