Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64355: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crocoblock JetElements For Elementor

0
Medium
VulnerabilityCVE-2025-64355cvecve-2025-64355cwe-79
Published: Thu Dec 18 2025 (12/18/2025, 16:16:33 UTC)
Source: CVE Database V5
Vendor/Project: Crocoblock
Product: JetElements For Elementor

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetElements For Elementor allows DOM-Based XSS.This issue affects JetElements For Elementor: from n/a through 2.7.12.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:03:01 UTC

Technical Analysis

CVE-2025-64355 is a DOM-based Cross-site Scripting (XSS) vulnerability classified under CWE-79, found in the Crocoblock JetElements plugin for Elementor, a popular WordPress page builder add-on. The vulnerability stems from improper neutralization of user-supplied input during web page generation, which allows malicious scripts to be injected and executed within the victim's browser context. This flaw affects all versions up to 2.7.12. The attack vector requires network access (remote), low attack complexity, and low privileges, but does require user interaction (e.g., clicking a crafted link or visiting a malicious page). The vulnerability has a CVSS 3.1 base score of 6.5, indicating medium severity, with impacts on confidentiality, integrity, and availability. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the entire web application. No known exploits have been reported in the wild, and no official patches have been published yet. The vulnerability allows attackers to execute arbitrary JavaScript code in the context of users visiting affected websites, potentially leading to session hijacking, data theft, defacement, or further exploitation. The plugin is widely used in WordPress environments, especially for e-commerce and content-rich sites, making it a significant risk vector.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality of user data, including personal and financial information, due to potential session hijacking and data theft. Integrity of website content and user interactions can be compromised, leading to misinformation or unauthorized actions performed on behalf of users. Availability may also be affected if attackers leverage the vulnerability to deface websites or disrupt services. Organizations in sectors such as e-commerce, finance, and media, which rely heavily on WordPress and Elementor with JetElements, are particularly vulnerable. The vulnerability can erode customer trust and lead to regulatory penalties under GDPR if personal data is compromised. Given the widespread use of WordPress in Europe, the threat surface is substantial, especially for small and medium enterprises that may lack robust security controls.

Mitigation Recommendations

1. Immediately audit all WordPress sites using JetElements for Elementor to identify affected versions (up to 2.7.12). 2. Apply strict input validation and sanitization on all user-supplied data, especially in custom code or additional plugins interacting with JetElements. 3. Implement a strong Content Security Policy (CSP) to restrict execution of unauthorized scripts and reduce XSS impact. 4. Monitor web server and application logs for unusual requests or script injection attempts targeting JetElements components. 5. Educate users and administrators about the risks of clicking unknown links or visiting untrusted pages to reduce successful exploitation via user interaction. 6. Once an official patch or update is released by Crocoblock, prioritize immediate deployment across all affected environments. 7. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads specific to JetElements. 8. Regularly backup website data and configurations to enable quick recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:06.889Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944323d4eb3efac369b37b2

Added to database: 12/18/2025, 4:56:29 PM

Last enriched: 1/21/2026, 12:03:01 AM

Last updated: 2/7/2026, 5:04:35 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats