Description
The JetEngine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘list_tag’ parameter in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-01-18
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The JetEngine plugin for WordPress suffers from a stored cross‑site scripting flaw that can be triggered through the list_tag parameter. The flaw stems from insufficient input sanitization and output escaping, allowing authenticated users with Contributor‑level access or higher to embed arbitrary web scripts. When a victim accesses a page containing the injected value, the malicious script executes in the victim’s browser, potentially leading to session hijacking, credential theft, defacement, or phishing attacks. This vulnerability grants attackers a persistent control over the user’s viewing context but does not provide remote code execution on the server side.

Affected Systems

Crocoblock’s JetEngine plugin for WordPress in all releases up to and including version 3.6.2 is affected. Any site that has installed one of these vulnerable versions is at risk. The vulnerability remains in all prior releases of the plugin; upgrading to a later version completely removes the flaw.

Risk and Exploitability

The official CVSS score is 6.4, placing the issue in the medium severity range. The EPSS score of less than 1% indicates that exploitation attempts are relatively unlikely at present, and the vulnerability is not listed in the CISA KEV catalog. The attack requires the attacker to possess Contributor or higher credentials, which may be available through legitimate user roles. Once authenticated, the attacker submits a crafted value for the list_tag field, which then persists in the database and is rendered on the front‑end when the corresponding page is viewed. The impact is limited to browsers of authenticated or unfiltered users who view the injected content, but the attacker can leverage this to conduct session‑level attacks against those users.

Generated by OpenCVE AI on April 21, 2026 at 22:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the JetEngine plugin to version 3.6.3 or later to remove the underlying input validation and output escaping issue.
  • If an upgrade is not immediately possible, restrict Contributor or higher level access for users, or disable the list_tag functionality via custom code or a complementary security plugin.
  • Verify that the list_tag parameter is no longer writable by an authenticated attacker by inspecting the plugin’s settings page or database entries for unexpected values.

Generated by OpenCVE AI on April 21, 2026 at 22:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1632 The JetEngine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘list_tag’ parameter in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 21 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 18 Jan 2025 07:15:00 +0000

Type Values Removed Values Added
Description The JetEngine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘list_tag’ parameter in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Jet Engine <= 3.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via list_tag Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Crocoblock Jetengine
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:38.460Z

Reserved: 2025-01-09T22:28:04.320Z

Link: CVE-2025-0369

cve-icon Vulnrichment

Updated: 2025-01-21T21:20:37.593Z

cve-icon NVD

Status : Deferred

Published: 2025-01-18T07:15:09.720

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-0369

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:30:06Z

Weaknesses