Description
The Multicollab: Content Team Collaboration and Editorial Workflow plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'cf_add_comment' function in all versions up to, and including, 5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add comments to arbitrary collaborations.
Published: 2026-05-16
Score: 4.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The reported flaw resides in the cf_add_comment function of the Multicollab plugin for WordPress, where an integrity check that verifies a user’s capability is omitted. Consequently, any user who can authenticate to the WordPress site—starting at the Subscriber role or higher—can craft a request that inserts a comment into any collaboration. The injected comment is accepted without verification of ownership or permission, enabling unintended data modification within the collaborative environment. This issue does not give an attacker the ability to take over the site or read arbitrary data, but it exposes the collaborative content to manipulation by lower privileged members.

Affected Systems

The vulnerability affects all installations of Multicollab: Content Team Collaboration and Editorial Workflow version 5.2 and earlier. Users of the plugin on any WordPress site, regardless of site size or domain, are potentially impacted as long as a Subscriber or higher role is present and can authenticate.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, and the EPSS score is not available, suggesting that the exploitation probability has not been quantified yet. The vulnerability is not listed in CISA’s KEV catalog. Attackers require only authenticated access to the site, which is widely available in many WordPress deployments. Because the flaw is a missing control that permits comment creation, the attack path is straightforward: an individual with a subscriber‑level or higher account can submit a specially crafted request via the plugin’s interface or API, resulting in an unauthorized comment. Given the lack of restrictions on the content of the comment, this could be used to spread misinformation or disrupt collaboration workflows.

Generated by OpenCVE AI on May 16, 2026 at 13:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Multicollab plugin to version 5.3 or later, which removes the missing capability check in the cf_add_comment function.
  • If an upgrade is infeasible, apply a local patch by inserting a capability verification such as $current_user->has_cap('edit_collaborations') before processing the addition of comments.
  • Disable or restrict the comment feature for users with Subscriber role or lower, or adjust role capabilities so that only administrators can add collaboration comments.

Generated by OpenCVE AI on May 16, 2026 at 13:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description The Multicollab: Content Team Collaboration and Editorial Workflow plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'cf_add_comment' function in all versions up to, and including, 5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add comments to arbitrary collaborations.
Title Multicollab: Content Team Collaboration and Editorial Workflow <= 5.2 - Missing Authorization to Authenticated (Subscriber+) Collaboration Comment
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-16T12:30:18.796Z

Reserved: 2025-05-01T16:22:13.929Z

Link: CVE-2025-4202

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T13:16:16.073

Modified: 2026-05-16T13:16:16.073

Link: CVE-2025-4202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T13:30:23Z

Weaknesses