CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NasaTheme Elessi allows Reflected XSS. This issue affects Elessi: from n/a through 6.3.9.
AnalysisAI
CVE-2025-49873 is a Reflected Cross-Site Scripting (XSS) vulnerability in NasaTheme's Elessi WordPress theme that allows unauthenticated attackers to inject malicious scripts into web pages viewed by victims. Versions up to and including 6.3.9 are affected. An attacker can steal session cookies, perform actions on behalf of users, or redirect users to malicious sites with minimal complexity (network-accessible input, user interaction required). The vulnerability lacks confirmed EPSS data and KEV listing at this time, but the CVSS 7.1 score and reflected XSS nature indicate moderate-to-high priority.
Technical ContextAI
This vulnerability exploits improper input sanitization in the Elessi WordPress theme during web page generation (CWE-79: Improper Neutralization of Input During Web Page Generation). The Elessi theme, developed by NasaTheme, is a commercial WordPress theme commonly used for e-commerce and business websites. The vulnerability is a Reflected XSS, meaning malicious input is echoed back in the HTTP response without proper HTML entity encoding or Content Security Policy protections. Affected CPE would be: cpe:2.3:a:nasatheme:elessi:*:*:*:*:*:wordpress:*:* (versions ≤6.3.9). Root cause is failure to sanitize user-supplied input parameters before rendering them in HTML context, typically in template files or shortcodes that process query parameters, POST data, or custom fields without wp_kses_post() or esc_html() WordPress escaping functions.
RemediationAI
- Immediate patch: Update Elessi theme to version 6.4.0 or later (version number inferred as first patched release; verify on NasaTheme official site or WordPress.org). 2. If patch unavailable: Temporarily disable or replace Elessi theme with alternative theme until patch is released. 3. Input validation workaround: If theme modification is necessary, audit affected template files for user input handling and apply WordPress escaping functions (esc_html(), esc_attr(), wp_kses_post()) to all echo statements. 4. WAF mitigation: Deploy Web Application Firewall rules to block common XSS payloads (e.g., <script>, javascript:, onerror=) in query parameters and POST data. 5. Content Security Policy (CSP): Implement strict CSP headers (Content-Security-Policy: default-src 'self'; script-src 'self') to mitigate XSS impact even if injected. 6. Monitor: Check theme update notifications in WordPress Dashboard; follow NasaTheme security advisories. 7. Validation: After patching, test with XSS payloads (e.g., <img src=x onerror=alert(1)>) in suspected input parameters to confirm fix.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-28328