EUVD-2025-17285

| CVE-2025-49262 MEDIUM
Cross-site Scripting (XSS) (CWE-79)
2025-06-06 [email protected]
5.4
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17285
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
CVE Published
Jun 06, 2025 - 13:15 nvd
MEDIUM 5.4

DescriptionNVD

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in shaonsina Sina Extension for Elementor allows Stored XSS. This issue affects Sina Extension for Elementor: from n/a through 3.6.1.

AnalysisAI

Stored Cross-Site Scripting (XSS) vulnerability in the Sina Extension for Elementor WordPress plugin (versions up to 3.6.1) that allows authenticated attackers with high privileges to inject malicious scripts into web pages. When victims view the affected pages, the injected scripts execute in their browsers, potentially enabling session hijacking, credential theft, or defacement. While the CVSS score of 7.6 indicates moderate-to-high severity, the requirement for high-privilege authentication (PR:H) significantly limits exploitation scope compared to unauthenticated XSS vulnerabilities.

Technical ContextAI

This vulnerability stems from improper input neutralization during web page generation (CWE-79: Improper Neutralization of Input During Web Page Generation). The Sina Extension for Elementor is a WordPress plugin that extends the Elementor page builder with additional functionality. The vulnerability likely exists in custom widgets or output functions where user-controlled input (possibly from element settings, custom fields, or shortcode parameters) is rendered directly into page HTML without adequate sanitization or escaping. The affected component processes data during the page rendering pipeline without properly neutralizing special characters or HTML entities, allowing XSS payload injection. This is a Stored XSS variant, meaning the malicious payload persists in the database and executes for all users viewing the affected page, rather than requiring a crafted URL.

RemediationAI

patch: WordPress Admin > Plugins > Updates, or download from https://wordpress.org/plugins/sina-extension-for-elementor/ (estimated URL; verify official source) workaround: WordPress Admin > Users > Edit roles/capabilities mitigation: Configure web server (Apache/Nginx) or WordPress security plugin (Wordfence, Sucuri) to enforce CSP and WAF rules detection: Use WordPress security scanner plugin or manual database review

Share

EUVD-2025-17285 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy