If the phone charger and cord are both capable of transmitting data, then you have a new attack surface for a device that has otherwise never been plugged into another computer.
Ex: USB phone charging ports in airports are notorious for being modified by bad actors to steal your phone data when you plug it in.