CVE-2026-0736
Unknown Unknown - Not Provided
Stored XSS in Collect.chat WordPress Plugin Allows Script Injection

Publication date: 2026-02-14

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Chatbot for WordPress by Collect.chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_inpost_head_script[synth_header_script]' post meta field in all versions up to, and including, 2.4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-14
Last Modified
2026-04-08
Generated
2026-05-06
AI Q&A
2026-02-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
collectchat chatbot_for_wordpress to 2.4.8 (inc)
collect.chat collect.chat to 2.4.8 (inc)
collect.chat collect.chat 2.4.9
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Chatbot for WordPress by Collect.chat plugin (versions up to and including 2.4.8) is a Stored Cross-Site Scripting (XSS) issue. It arises because the plugin does not properly sanitize and escape input in the '_inpost_head_script[synth_header_script]' post meta field.

This flaw allows authenticated users with Contributor-level access or higher to inject arbitrary web scripts into pages. These malicious scripts then execute whenever any user accesses the affected page, potentially compromising site security.


How can this vulnerability impact me? :

This Stored Cross-Site Scripting vulnerability can lead to several security impacts:

  • An attacker with Contributor-level access can inject malicious scripts that execute in the browsers of users visiting the infected pages.
  • Such scripts can steal sensitive information like cookies, session tokens, or other private data.
  • It can be used to perform actions on behalf of users without their consent, leading to account compromise or unauthorized operations.
  • The vulnerability can undermine user trust and damage the reputation of the affected website.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "The vulnerability involves Stored Cross-Site Scripting via the '_inpost_head_script[synth_header_script]' post meta field in the Collect.chat WordPress plugin versions up to 2.4.8. Detection involves checking for suspicious or malicious script content stored in this post meta field."}, {'type': 'paragraph', 'content': "To detect this vulnerability on your WordPress system, you can query the WordPress database for the presence of suspicious script tags or unusual content in the '_inpost_head_script' post meta key."}, {'type': 'list_item', 'content': "Use a SQL query to find posts with potentially malicious scripts in the '_inpost_head_script' meta field, for example:"}, {'type': 'list_item', 'content': "SELECT post_id, meta_value FROM wp_postmeta WHERE meta_key = '_inpost_head_script' AND meta_value LIKE '%<script>%';"}, {'type': 'list_item', 'content': "Check WordPress admin pages for unexpected or unauthorized chatbot scripts inserted via the plugin's meta boxes."}, {'type': 'paragraph', 'content': 'Additionally, monitoring HTTP responses for injected scripts originating from the Collect.chat plugin or unexpected script injections on pages can help detect exploitation.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The primary mitigation step is to update the Collect.chat WordPress plugin to version 2.4.9 or later, where the vulnerability has been addressed with improved input sanitization and output escaping.'}, {'type': 'paragraph', 'content': 'Until the update can be applied, restrict Contributor-level and higher user permissions to trusted users only, as the vulnerability requires authenticated users with at least Contributor access to exploit.'}, {'type': 'paragraph', 'content': "Review and clean any suspicious or unauthorized scripts stored in the '_inpost_head_script' post meta fields to remove injected malicious code."}, {'type': 'paragraph', 'content': 'Ensure that WordPress user capabilities are properly configured to prevent unauthorized script insertion, and consider disabling unfiltered HTML capabilities for users who do not require it.'}] [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart