Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jegtheme JNews - Frontend Submit jnews-frontend-submit allows Reflected XSS.This issue affects JNews - Frontend Submit: from n/a through <= 11.0.0.
Published: 2026-01-22
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is an Improper Neutralization of Input During Web Page Generation flaw that enables an attacker to inject malicious script into pages served to users. The injected script can execute in the victim’s browser, leading to credential theft, session hijacking, or defacement. The weakness is identified as CWE‑79, an input validation flaw that directly impacts user‑controlled input used in web page rendering.

Affected Systems

The issue affects the WordPress plugin JNews - Frontend Submit from jegtheme. All installations using any version up to and including 11.0.0 are potentially vulnerable, while newer releases are assumed to have the flaw fixed. Site owners running legacy versions on public WordPress sites are therefore at risk.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate severity, but the EPSS score of <1% suggests a low probability of exploitation at this time. The vulnerability is not currently listed in CISA’s KEV catalog, reducing the likelihood of widespread, documented attacks. Attackers would typically need to entice a user to visit a crafted URL that includes malicious parameters; whether the plugin processes such parameters in a way that allows execution depends on how the form fields are rendered. Because the flaw is reflected, it is generally easy to trigger once the victim clicks the link, meaning the attack vector is inferred to be user interaction on the public web rather than an internal or privileged exploit.

Generated by OpenCVE AI on April 29, 2026 at 11:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the JNews - Frontend Submit plugin to the latest release (expected 11.0.1 or later) which removes the reflected XSS vector.
  • If updating is not immediately possible, consider disabling the frontend submission functionality or removing the plugin to eliminate the vulnerable code path.
  • As a temporary measure, apply input sanitization or a web application firewall rule that blocks common XSS payloads for the parameters associated with the frontend submit form.

Generated by OpenCVE AI on April 29, 2026 at 11:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Jnews
Jnews jnews
Wordpress
Wordpress wordpress
Vendors & Products Jnews
Jnews jnews
Wordpress
Wordpress wordpress

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jegtheme JNews - Frontend Submit jnews-frontend-submit allows Reflected XSS.This issue affects JNews - Frontend Submit: from n/a through <= 11.0.0.
Title WordPress JNews - Frontend Submit plugin <= 11.0.0 - Reflected Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:08:09.698Z

Reserved: 2025-12-24T14:00:54.031Z

Link: CVE-2025-68904

cve-icon Vulnrichment

Updated: 2026-01-27T21:00:22.239Z

cve-icon NVD

Status : Deferred

Published: 2026-01-22T17:16:14.237

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-68904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T12:00:11Z

Weaknesses