VYPR
Medium severity6.4NVD Advisory· Published May 10, 2025· Updated Apr 15, 2026

CVE-2025-2944

CVE-2025-2944

Description

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video Button and Countdown Widgets in all versions up to, and including, 2.6.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Jeg Elementor Kit plugin for WordPress via insufficient sanitization in Video Button and Countdown widgets, affecting versions up to 2.6.12.

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to and including 2.6.12. The vulnerability resides in the plugin's Video Button and Countdown Widgets, where user-supplied attributes are not properly sanitized or escaped. This allows malicious input to be stored and later executed in the context of a user's browser when they visit a page containing these widgets.

Exploitation requires an authenticated attacker with at least contributor-level access to the WordPress site. The attacker can inject arbitrary web scripts by crafting payloads in widget attributes. The stored payload is triggered when any user, including administrators, accesses the affected page. The plugin's wide range of free and pro widgets, as described in the official plugin page [1], increases the potential attack surface.

The impact includes the ability to execute arbitrary JavaScript in the victim's session, leading to potential session hijacking, defacement, or redirection to malicious sites. The vulnerability has been assigned a CVSS v3 score of 6.4 (Medium), reflecting the need for authentication but the potential for significant harm.

Users should update the plugin to a patched version beyond 2.6.12 as soon as it becomes available. As of the advisory, no workaround has been detailed, but limiting contributor-level access or disabling the affected widgets may reduce risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.