Description
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table widget in all versions up to, and including, 2.10.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-01-10
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via the Pricing Table widget allows authenticated users to inject malicious scripts that execute in the browsers of all visitors to the injected page
Action: Patch Plugin
AI Analysis

Impact

Orbit Fox by ThemeIsle contains stored cross‑site scripting because user supplied attributes in the Pricing Table widget are not properly sanitized or escaped. The vulnerability can be exploited by any authenticated user with contributor‑level permissions or higher to inject JavaScript that will run whenever a visitor loads the page. The result is an arbitrary script execution on the victim’s browser, providing an attacker with the same privileges as the authenticated user such as credential stealing, cookie theft, or launching further attacks. The weakness is an instance of input validation failure and inadequate output encoding (CWE‑79).

Affected Systems

The vulnerability affects the Orbit Fox plugin for WordPress on all versions up to and including 2.10.43, including the Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts, and other modules distributed by ThemeIsle. Users installing or upgrading the plugin through the WordPress plugin repository or via a third‑party update mechanism are potentially impacted if they have not applied the vendor’s security fix.

Risk and Exploitability

The CVSS score of 6.4 categorizes this flaw as a moderate severity issue, and the EPSS score of less than 1% indicates that, according to current data, exploitation chances are low but non‑zero. It is not yet listed in CISA’s KEV catalog. The likely attack vector involves an authenticated contributor editing a pricing table, where the malicious JavaScript is stored in the database and later rendered on any page that references the widget. Once the flaw is exploited, the impact is limited to user browsers encountering the affected page, but it can lead to wide‑scale credential theft or session hijacking within the site’s audience.

Generated by OpenCVE AI on April 22, 2026 at 13:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Orbit Fox plugin to version 2.10.44 or later, which includes the proper input sanitization and output escaping for the Pricing Table widget.
  • If an upgrade cannot be performed immediately, remove or disable the Pricing Table widget for contributor and higher‑privileged roles, or restrict those roles from editing widget content.
  • Implement a Content Security Policy that disallows inline scripts or external scripts from untrusted sources, reducing the risk of script execution even if the flaw remains present.

Generated by OpenCVE AI on April 22, 2026 at 13:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1598 The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table widget in all versions up to, and including, 2.10.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Thu, 16 Jan 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle orbit Fox
CPEs cpe:2.3:a:themeisle:orbit_fox:*:*:*:*:*:wordpress:*:*
Vendors & Products Themeisle
Themeisle orbit Fox

Fri, 10 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Jan 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table widget in all versions up to, and including, 2.10.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Orbit Fox by ThemeIsle <= 2.10.43 - Authenticated (Contributor+) Stored Cross-Site Scripting via Pricing Table Widget
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Themeisle Orbit Fox
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:32.512Z

Reserved: 2025-01-07T17:51:38.622Z

Link: CVE-2025-0311

cve-icon Vulnrichment

Updated: 2025-01-10T14:51:13.043Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-10T07:15:08.507

Modified: 2025-01-16T21:29:36.977

Link: CVE-2025-0311

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:45:18Z

Weaknesses