Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2944: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jegtheme Jeg Elementor Kit

0
Medium
VulnerabilityCVE-2025-2944cvecve-2025-2944cwe-79
Published: Sat May 10 2025 (05/10/2025, 05:32:16 UTC)
Source: CVE
Vendor/Project: jegtheme
Product: Jeg Elementor Kit

Description

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video Button and Countdown Widgets in all versions up to, and including, 2.6.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:11:53 UTC

Technical Analysis

The Jeg Elementor Kit plugin for WordPress, widely used for building and customizing websites, contains a stored cross-site scripting (XSS) vulnerability identified as CVE-2025-2944. This vulnerability is classified under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the issue exists in the Video Button and Countdown Widgets of the plugin, where user-supplied attributes are not properly sanitized or escaped before being rendered on web pages. As a result, an attacker with authenticated contributor-level access or higher can inject arbitrary JavaScript code into pages. When other users visit these pages, the malicious scripts execute in their browsers, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of the victim. The vulnerability affects all versions up to and including 2.6.12. The CVSS 3.1 base score is 6.4, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality and integrity with no availability impact. Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the common use of the plugin and the typical access levels granted to contributors in WordPress environments. The scope is considered changed (S:C) because the vulnerability can affect other users beyond the attacker. No official patches or updates have been linked yet, so mitigation relies on access control and input validation measures.

Potential Impact

This vulnerability can lead to unauthorized script execution in the browsers of users visiting compromised pages, resulting in session hijacking, credential theft, defacement, or redirection to malicious sites. For organizations, this can cause reputational damage, loss of user trust, and potential data breaches. Since the attack requires contributor-level access, insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The scope change means that the impact extends beyond the attacker to all users who view the infected content. Although availability is not affected, the confidentiality and integrity of user data and site content are at risk. Given WordPress's widespread use globally, especially among small to medium businesses and content creators, the vulnerability could be exploited to target a broad range of organizations. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately review and restrict contributor-level access to trusted users only, implementing the principle of least privilege. Until an official patch is released, administrators can disable or remove the vulnerable Video Button and Countdown Widgets from the Jeg Elementor Kit plugin. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting these widgets can provide interim protection. Regularly audit user-generated content for suspicious scripts and sanitize inputs at the application level where possible. Monitoring logs for unusual contributor activity can help detect attempts to exploit this vulnerability. Additionally, keeping WordPress core and all plugins up to date is critical; once a patch for this vulnerability is available, it should be applied promptly. Educate contributors about the risks of injecting untrusted content and enforce strict content review processes before publishing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-28T22:08:03.732Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7111

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 2/27/2026, 1:11:53 PM

Last updated: 3/26/2026, 8:44:40 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses