CVE-2026-39696
Received Received - Intake
DOM-Based XSS in Elfsight WhatsApp Chat CC

Publication date: 2026-04-08

Last updated on: 2026-04-08

Assigner: Patchstack

Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elfsight Elfsight WhatsApp Chat CC elfsight-whatsapp-chat allows DOM-Based XSS.This issue affects Elfsight WhatsApp Chat CC: from n/a through <= 1.2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
elfsight elfsight_whatsapp_chat to 1.2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-39696 is a Cross Site Scripting (XSS) vulnerability in the WordPress Elfsight WhatsApp Chat CC Plugin versions up to and including 1.2.0.

This vulnerability allows attackers to inject malicious scripts, such as redirects, advertisements, or other HTML payloads, into websites using the plugin. These scripts execute when visitors access the affected site.

Exploitation requires user interaction by a privileged user with at least Contributor or Developer roles, who must perform an action like clicking a malicious link, visiting a crafted page, or submitting a form.

The vulnerability is classified under OWASP Top 10 A3: Injection and has a CVSS severity score of 6.5, indicating a moderate risk level.


How can this vulnerability impact me? :

This vulnerability can allow attackers to execute malicious scripts on your website, which may lead to unauthorized redirects, display of unwanted advertisements, or other harmful HTML payloads.

Successful exploitation depends on interaction by a privileged user, which could compromise the integrity and trustworthiness of your website.

Although considered low priority and unlikely to be exploited in targeted attacks, it can be used in mass-exploit campaigns affecting many websites indiscriminately.

Immediate mitigation involves updating the plugin once a patch is available or seeking assistance from hosting providers or web developers.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability affects WordPress sites using the Elfsight WhatsApp Chat CC Plugin version 1.2.0 or earlier. Detection involves verifying the plugin version installed on your WordPress site.

Since this is a DOM-Based Cross-Site Scripting (XSS) vulnerability, detection can include checking for unusual script injections or payloads in the web pages generated by the plugin.

You can check the plugin version via WordPress admin dashboard or by running commands on the server hosting the WordPress site.

  • Use WP-CLI to check the plugin version: `wp plugin list | grep elfsight-whatsapp-chat`
  • Manually inspect the plugin directory for version info: `cat wp-content/plugins/elfsight-whatsapp-chat/readme.txt | grep 'Stable tag'`
  • Monitor web traffic for suspicious script injections or unexpected HTML payloads in pages served by the plugin.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the Elfsight WhatsApp Chat CC Plugin to a patched version once it becomes available.

Since no official patch is currently available, you should seek assistance from your hosting provider or web developers to implement temporary protective measures.

Limit user roles that can interact with the plugin to trusted users only, as exploitation requires interaction by users with at least Contributor or Developer roles.

Monitor and restrict user inputs and interactions that could trigger the vulnerability, such as clicking links or submitting forms related to the plugin.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart