Description
The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-03-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Update Theme
AI Analysis

Impact

The Traveler WordPress theme contains insufficient input sanitization and output escaping, allowing unauthenticated attackers to inject arbitrary scripts via multiple URL parameters. When a victim follows a crafted link, the malicious script runs in the victim’s browser. The vulnerability is classified as CWE‑79 and does not provide direct code execution, but it enables attackers to execute scripts in users’ browsers.

Affected Systems

All installations of the ShineTheme Travel Booking WordPress theme with a version of 3.1.8 or earlier are affected. The vulnerability applies to every instance that has not been upgraded beyond 3.1.8.

Risk and Exploitability

The CVSS score of 6.1 indicates a medium severity, while the EPSS score of < 1 % shows a very low exploitation probability at any given time. The vulnerability is not listed in the CISA KEV catalog. Attackers could construct a URL containing malicious query parameters and rely on social engineering (e.g., phishing emails or compromised sites) to get a user to click it, thereby executing the embedded script.

Generated by OpenCVE AI on April 22, 2026 at 01:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Traveler theme to a newer version than 3.1.8 to remove the XSS vectors.
  • Configure a web application firewall or similar filtering mechanism to block request parameters containing malicious script fragments.
  • Implement a Content Security Policy that restricts script sources and disallows inline scripts to mitigate damage if an attacker succeeds.

Generated by OpenCVE AI on April 22, 2026 at 01:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6629 The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00129}

epss

{'score': 0.00197}


Fri, 28 Mar 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Shinecommerce
Shinecommerce traveler
CPEs cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*
Vendors & Products Shinecommerce
Shinecommerce traveler

Mon, 17 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 15 Mar 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Traveler <= 3.1.8 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Shinecommerce Traveler
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:53.948Z

Reserved: 2025-02-28T06:08:29.393Z

Link: CVE-2025-1773

cve-icon Vulnrichment

Updated: 2025-03-17T16:55:48.235Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-15T05:15:47.403

Modified: 2025-03-28T15:02:33.313

Link: CVE-2025-1773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T02:00:05Z

Weaknesses