Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EnvoThemes Envo Extra envo-extra allows Stored XSS.This issue affects Envo Extra: from n/a through <= 1.9.11.
Published: 2025-11-21
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Envo Extra plugin accepts user input that is stored and later displayed without proper escaping, allowing an attacker to embed malicious scripts into web pages. A successful exploit would lead to the execution of attacker‑controlled code in the browsers of any user who visits the affected page, enabling data theft, session hijacking, or defacement. The vulnerability is rooted in a lack of input validation and sanitization, classifying it as a classic Cross‑Site Scripting flaw (CWE‑79).

Affected Systems

The affected product is the EnvoExtra plugin for WordPress by EnvoThemes, available in any version up to and including 1.9.11. No specific release notes are provided beyond this upper bound, so any installation of a version 1.9.11 or earlier is at risk.

Risk and Exploitability

The CVSS score of 6.5 marks this vulnerability as moderate. The EPSS score of less than 1% indicates that, at the time of analysis, the likelihood of exploitation is low, and the flaw is not listed in CISA’s KEV catalog. Exploitation requires an attacker to submit malicious input that the plugin stores, which can then be served to users. The description does not specify authentication, so the attack may be possible from unprivileged actors if the plugin’s input interface is publicly accessible. The stored nature of the flaw means that a single injection could affect every subsequent visitor to the compromised content.

Generated by OpenCVE AI on April 30, 2026 at 05:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Envo Extra plugin to the most recent version available from EnvoThemes, which contains the required fix.
  • If the plugin cannot be updated immediately, remove it from the site or disable its functionality to eliminate the attack surface.
  • Implement a Web Application Firewall rule or input validation layer that rejects or sanitizes potentially malicious scripts before they are stored by the plugin.

Generated by OpenCVE AI on April 30, 2026 at 05:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Envothemes
Envothemes envo Extra
Wordpress
Wordpress wordpress
Vendors & Products Envothemes
Envothemes envo Extra
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 12:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EnvoThemes Envo Extra envo-extra allows Stored XSS.This issue affects Envo Extra: from n/a through <= 1.9.11.
Title WordPress Envo Extra plugin <= 1.9.11 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Envothemes Envo Extra
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:15.744Z

Reserved: 2025-11-21T11:20:46.955Z

Link: CVE-2025-66066

cve-icon Vulnrichment

Updated: 2025-11-21T21:51:51.647Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T13:15:47.653

Modified: 2026-04-27T18:16:32.677

Link: CVE-2025-66066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses