Description
The BLOGCHAT Chat System plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.6.3. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-05-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows an attacker who can lure a site administrator to click a crafted link to send a forged request to the blogchat‑widget settings page. Because the plugin does not verify a nonce when updating settings, the attacker can inject JavaScript that will execute in the context of any user who views the affected setting. This stored XSS can be used to steal session cookies, deface the site, or hijack authenticated sessions. The weakness is a classic CSRF flaw (CWE‑352) with the potential to lead to significant confidentiality and integrity risks.

Affected Systems

Vendor Rdbeach’s BLOGCHAT Chat System for WordPress, versions 1.3.6.3 and earlier.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity issue. No EPSS data is available and the vulnerability is not listed in CISA’s KEV catalog, suggesting it has not been widely exploited yet. The likely attack vector is social‑engineering: an unauthenticated attacker must persuade an administrator to perform an action that submits the forged form. If successful, the resulting stored XSS could affect all users who view the compromised chat configuration.

Generated by OpenCVE AI on May 20, 2026 at 03:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BLOGCHAT Chat System to the latest release that includes proper nonce validation for settings updates
  • If an upgrade is not possible for an immediate fix, disable the plugin’s settings update feature or remove the plugin altogether to eliminate the attack surface
  • As a temporary measure, review and sanitize the current chat settings for any injected scripts and mitigate potential XSS by configuring the site’s content security policy to restrict script sources

Generated by OpenCVE AI on May 20, 2026 at 03:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Rdbeach
Rdbeach blogchat Chat System
Wordpress
Wordpress wordpress
Vendors & Products Rdbeach
Rdbeach blogchat Chat System
Wordpress
Wordpress wordpress

Wed, 20 May 2026 02:15:00 +0000

Type Values Removed Values Added
Description The BLOGCHAT Chat System plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.6.3. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title BLOGCHAT Chat System <= 1.3.6.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting via Settings Update
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Rdbeach Blogchat Chat System
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-20T13:56:48.759Z

Reserved: 2026-05-12T17:45:35.584Z

Link: CVE-2026-8420

cve-icon Vulnrichment

Updated: 2026-05-20T13:56:33.891Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T02:16:40.113

Modified: 2026-05-20T13:54:54.890

Link: CVE-2026-8420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:38:21Z

Weaknesses