Description
The Kingcabs theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘progressbarLayout’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-13
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The vulnerability allows authenticated WordPress users with Contributor level or higher to store malicious scripts in the progressbarLayout parameter of the Kingcabs theme. When the stored value is later rendered on an affected page, any browser visiting that page will execute the injected script in the context of the site. This can lead to session hijacking, defacement, or distribution of malware to site visitors.

Affected Systems

Kingcabs theme for WordPress versions 1.1.9 and earlier, provided by the vendor sparklewpthemes:Kingcabs. The issue resides in the progressbar block handling code. Any WordPress installation using one of these theme versions is affected.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity. The EPSS score of less than 1% reflects a very low likelihood of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. The attack requires the attacker to be an authenticated Contributor or higher user with permission to edit progress bar settings, making the attack vector internal. The attacker could, however, compromise the victim's session or steal user credentials if the injected script is used for phishing or keylogging. Based on the description, it is inferred that the attacker must first gain authorized access to the WordPress admin area to submit the malicious value.

Generated by OpenCVE AI on April 21, 2026 at 17:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Kingcabs theme to the latest release that includes the XSS fix.
  • If no newer release is available, patch the progressbarLayout handling code to sanitize and escape all user input.
  • If a patch cannot be applied, disable or remove the progressbar block so the malicious content cannot be stored, and consider tightening Contributor permissions or revoking that capability if the feature is not needed.

Generated by OpenCVE AI on April 21, 2026 at 17:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Kingcabs theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘progressbarLayout’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Kingcabs <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via progressbarLayout Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:55.224Z

Reserved: 2025-07-03T22:18:11.935Z

Link: CVE-2025-7058

cve-icon Vulnrichment

Updated: 2025-12-15T15:43:24.010Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:55.290

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:15:25Z

Weaknesses