Description
The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.0.1 due to insufficient input sanitization in the countdown widget's redirect functionality. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript that will execute when an administrator or other user views the page containing the malicious countdown element.
Published: 2026-01-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (arbitrary JavaScript execution)
Action: Patch Now
AI Analysis

Impact

The Jeg Elementor Kit plugin for WordPress suffers from a stored Cross‑Site Scripting flaw in the countdown widget’s redirect functionality. Because user input is not properly sanitized, an authenticated user with Contributor or higher privilege can inject malicious JavaScript that is saved and later executed automatically when the page containing the countdown element is viewed by any user, including administrators. This flaw is a classic example of a code injection weakness (CWE‑79), enabling attackers to run arbitrary scripts in the victim’s browser, potentially stealing cookies, session tokens, or modifying page content.

Affected Systems

All installations that run Jeg Elementor Kit for Elementor – Powerful Addons for Elementor on WordPress with version 3.0.1 or earlier are vulnerable. The flaw exists in every version of the plugin up to and including 3.0.1; any WordPress site that has this plugin installed and a user who can inject content via the countdown widget is at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium severity, primarily due to the requirement for authenticated access to inject and the local execution context. The EPSS score of <1 percentage point suggests that, as of now, the likelihood of widespread exploitation is very low. However, because the vulnerability allows arbitrary JavaScript execution, a determined attacker who can compromise a Contributor‑level account, or force a user with higher privileges to view a maliciously crafted page, could achieve significant damage. The flaw is not listed in CISA’s KEV catalog, so no public exploits are documented yet.

Generated by OpenCVE AI on April 21, 2026 at 16:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Jeg Elementor Kit to the latest release (version 3.0.2 or newer) once it is available, as that version removes the insecure redirect handling.
  • If an update cannot be applied immediately, restrict the Contributor role’s ability to add or edit widgets or disable the Countdown widget so that no user can upload malicious scripts via it.
  • Audit existing pages that contain countdown widgets for any unexpected JavaScript and remove it manually if found.

Generated by OpenCVE AI on April 21, 2026 at 16:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Jegtheme
Jegtheme jeg Elementor Kit
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Jegtheme
Jegtheme jeg Elementor Kit
Wordpress
Wordpress wordpress

Thu, 08 Jan 2026 03:00:00 +0000

Type Values Removed Values Added
Description The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.0.1 due to insufficient input sanitization in the countdown widget's redirect functionality. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript that will execute when an administrator or other user views the page containing the malicious countdown element.
Title Jeg Elementor Kit <= 3.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Elementor Elementor
Jegtheme Jeg Elementor Kit
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:38.583Z

Reserved: 2025-12-08T16:22:19.518Z

Link: CVE-2025-14275

cve-icon Vulnrichment

Updated: 2026-01-08T16:21:55.291Z

cve-icon NVD

Status : Deferred

Published: 2026-01-08T03:15:43.033

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:45:15Z

Weaknesses