CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
2DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetSearch jet-search allows Reflected XSS.This issue affects JetSearch: from n/a through <= 3.5.10.
AnalysisAI
Reflected cross-site scripting (XSS) in Crocoblock JetSearch WordPress plugin versions through 3.5.10 allows unauthenticated remote attackers to execute arbitrary JavaScript in victim browsers via maliciously crafted URLs. The vulnerability requires user interaction (clicking a malicious link) but carries a changed scope, meaning successful exploitation can impact resources beyond the vulnerable component. EPSS probability is low (0.07%, 22nd percentile), indicating minimal observed exploitation attempts, and no public exploit code or CISA KEV listing exists at time of analysis.
Technical ContextAI
JetSearch is a WordPress search plugin from Crocoblock that enhances site search functionality with AJAX capabilities and custom search forms. This vulnerability stems from CWE-79 (improper neutralization of input during web page generation), where user-supplied input in search parameters or plugin settings is not properly sanitized before being reflected back in HTML responses. The CVSS vector indicates network-based exploitation with low attack complexity, requiring no authentication (PR:N) but necessitating user interaction (UI:R). The changed scope (S:C) flag suggests the vulnerable component's authorization boundary differs from the impacted component, meaning successful XSS could affect the broader WordPress installation or user sessions beyond just the plugin itself.
Affected ProductsAI
Crocoblock JetSearch WordPress plugin versions from earliest available through 3.5.10 are vulnerable. JetSearch is a premium WordPress search enhancement plugin typically deployed on e-commerce and content-heavy WordPress sites requiring advanced search functionality. The vulnerability affects all installations where user-supplied input from search queries or plugin parameters can be reflected in page output. Vendor security details are available at https://patchstack.com/database/Wordpress/Plugin/jet-search/vulnerability/wordpress-jetsearch-plugin-3-5-10-cross-site-scripting-xss-vulnerability.
RemediationAI
Upgrade JetSearch to version 3.5.11 or later, which addresses the input sanitization flaw. Crocoblock users should access updates through their Crocoblock account dashboard or WordPress plugin update mechanism. As an interim mitigation, implement Content Security Policy (CSP) headers with strict script-src directives to limit XSS impact, and consider deploying a web application firewall (WAF) with XSS detection rules to filter malicious requests. Review server logs for suspicious search query parameters containing JavaScript syntax such as angle brackets, script tags, or event handlers. Full vendor advisory and technical details available at https://patchstack.com/database/Wordpress/Plugin/jet-search/vulnerability/wordpress-jetsearch-plugin-3-5-10-cross-site-scripting-xss-vulnerability.
Share
External POC / Exploit Code
Leaving vuln.today