VYPR
Medium severity5.4NVD Advisory· Published Dec 20, 2025· Updated Apr 15, 2026

CVE-2025-14298

CVE-2025-14298

Description

The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's thegem_te_search shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in FiboSearch Ajax Search for WooCommerce via insufficient input sanitization in the `thegem_te_search` shortcode, exploitable by Contributors and above.

The FiboSearch – Ajax Search for WooCommerce plugin (versions up to and including 1.32.0) contains a stored cross-site scripting (XSS) vulnerability in its thegem_te_search shortcode. The root cause is inadequate input sanitization and output escaping on user-supplied attributes, allowing malicious scripts to be injected into pages and executed when a user visits the compromised page.

Exploitation requires that the attacker has at least Contributor-level access to the WordPress site, and the site must be using TheGem (premium) theme with Header Builder mode enabled. Additionally, the FiboSearch "Replace search bars" option must be enabled for TheGem integration. An authenticated attacker with these conditions can craft a shortcode attribute containing JavaScript payloads, which will be stored and later rendered unsafely on the frontend.

Successful exploitation results in arbitrary JavaScript execution in the context of any user accessing the injected page. This could lead to session hijacking, defacement, or theft of sensitive information such as cookies or credentials. Because the script executes in the browser of any visitor, the impact can be widespread in a WooCommerce store.

As of the reference advisory, patches have not been explicitly confirmed in the provided text. The plugin's official page [1] provides the download and changelog; users should update to a patched version if available. Until then, restricting contributor access and disabling the vulnerable shortcode integration are potential mitigations.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.