Impact
The JetEngine plugin for WordPress contains an improper input neutralization flaw that permits reflected XSS. An attacker can inject malicious JavaScript that is executed within the context of the victim’s browser when the user interacts with certain plugin pages. This may lead to defacement, credential theft, or session hijacking depending on the exploitability of the injected script.
Affected Systems
Crocoblock’s JetEngine WordPress plugin, any installation running version 3.7.7 or earlier is vulnerable.
Risk and Exploitability
The CVSS score of 7.1 marks this as a high‑severity vulnerability. The EPSS score of <1 % indicates a low likelihood of widespread exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that the attack vector is a crafted HTTP request that results in reflected script execution when a user loads the affected interface; no special privileges are required.
OpenCVE Enrichment