Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jegtheme JNews Gallery jnews-gallery allows Stored XSS.This issue affects JNews Gallery: from n/a through < 12.0.1.
Published: 2025-12-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability results from improper neutralization of user input during web page generation, allowing stored XSS in the JNews Gallery plugin. An attacker who injects malicious script into gallery content can force that script to run in the browsers of visitors to the affected page, potentially leading to defacement, phishing, or session hijacking. The weakness is classified as CWE‑79.

Affected Systems

WordPress sites that run jegtheme JNews Gallery version earlier than 12.0.1 are affected. This includes all builds from the first release up to, but not including, 12.0.1. Any site using these versions is vulnerable until the update is applied.

Risk and Exploitability

With a CVSS score of 6.5 the severity is medium. The EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to be able to insert a payload into gallery content, which most likely means having permission to add or edit gallery items in WordPress. This assumption about the required privileges is inferred from the plugin’s content management interface, as the CVE description does not explicitly state the necessary attack vector. Once the payload is stored, it is served to all visitors of pages that display the gallery, meaning the attack can affect multiple users on a single site.

Generated by OpenCVE AI on April 29, 2026 at 16:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the JNews Gallery plugin to version 12.0.1 or later to apply the vendor patch.
  • Restrict the user roles that can create or edit gallery items to trusted administrators or editors.
  • Deploy a web application firewall or security plugin to detect and block XSS payloads.

Generated by OpenCVE AI on April 29, 2026 at 16:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Jnews
Jnews jnews
Wordpress
Wordpress wordpress
Vendors & Products Jnews
Jnews jnews
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jegtheme JNews Gallery jnews-gallery allows Stored XSS.This issue affects JNews Gallery: from n/a through < 12.0.1.
Title WordPress JNews Gallery plugin < 12.0.1 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:18:14.699Z

Reserved: 2025-12-09T12:21:12.170Z

Link: CVE-2025-67538

cve-icon Vulnrichment

Updated: 2025-12-09T19:16:04.512Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:28.903

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-67538

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:15:15Z

Weaknesses