CVE-2025-49930

HIGH
2025-10-22 [email protected]
7.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Oct 22, 2025 - 15:15 nvd
HIGH 7.1

DescriptionNVD

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetSearch jet-search allows Reflected XSS.This issue affects JetSearch: from n/a through <= 3.5.10.

AnalysisAI

Reflected cross-site scripting (XSS) in Crocoblock JetSearch WordPress plugin versions through 3.5.10 allows unauthenticated remote attackers to execute arbitrary JavaScript in victim browsers via maliciously crafted URLs. The vulnerability requires user interaction (clicking a malicious link) but carries a changed scope, meaning successful exploitation can impact resources beyond the vulnerable component. EPSS probability is low (0.07%, 22nd percentile), indicating minimal observed exploitation attempts, and no public exploit code or CISA KEV listing exists at time of analysis.

Technical ContextAI

JetSearch is a WordPress search plugin from Crocoblock that enhances site search functionality with AJAX capabilities and custom search forms. This vulnerability stems from CWE-79 (improper neutralization of input during web page generation), where user-supplied input in search parameters or plugin settings is not properly sanitized before being reflected back in HTML responses. The CVSS vector indicates network-based exploitation with low attack complexity, requiring no authentication (PR:N) but necessitating user interaction (UI:R). The changed scope (S:C) flag suggests the vulnerable component's authorization boundary differs from the impacted component, meaning successful XSS could affect the broader WordPress installation or user sessions beyond just the plugin itself.

Affected ProductsAI

Crocoblock JetSearch WordPress plugin versions from earliest available through 3.5.10 are vulnerable. JetSearch is a premium WordPress search enhancement plugin typically deployed on e-commerce and content-heavy WordPress sites requiring advanced search functionality. The vulnerability affects all installations where user-supplied input from search queries or plugin parameters can be reflected in page output. Vendor security details are available at https://patchstack.com/database/Wordpress/Plugin/jet-search/vulnerability/wordpress-jetsearch-plugin-3-5-10-cross-site-scripting-xss-vulnerability.

RemediationAI

Upgrade JetSearch to version 3.5.11 or later, which addresses the input sanitization flaw. Crocoblock users should access updates through their Crocoblock account dashboard or WordPress plugin update mechanism. As an interim mitigation, implement Content Security Policy (CSP) headers with strict script-src directives to limit XSS impact, and consider deploying a web application firewall (WAF) with XSS detection rules to filter malicious requests. Review server logs for suspicious search query parameters containing JavaScript syntax such as angle brackets, script tags, or event handlers. Full vendor advisory and technical details available at https://patchstack.com/database/Wordpress/Plugin/jet-search/vulnerability/wordpress-jetsearch-plugin-3-5-10-cross-site-scripting-xss-vulnerability.

Share

CVE-2025-49930 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy