VYPR
High severity7.1NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-68495

CVE-2025-68495

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetEngine jet-engine allows Reflected XSS.This issue affects JetEngine: from n/a through <= 3.8.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected Cross-Site Scripting (XSS) vulnerability in Crocoblock JetEngine plugin for WordPress allows attackers to inject malicious scripts via reflected requests, affecting versions up to 3.8.0.

The vulnerability is a reflected Cross-Site Scripting (XSS) flaw in the Crocoblock JetEngine plugin for WordPress, arising from improper neutralization of user-supplied input during web page generation. This allows an attacker to inject arbitrary HTML and JavaScript into a response, which is then executed in the victim's browser. The issue affects all versions of JetEngine up to and including 3.8.0 [1].

Exploitation requires user interaction: an attacker must trick a victim—often a privileged user such as an administrator—into clicking a crafted link or visiting a maliciously constructed page. The attacker does not need prior authentication; the attack can be initiated by any role that can reach the vulnerable endpoint. The reflected nature means the payload is delivered via the request itself and immediately executed when the response is rendered [1].

Successful exploitation enables the attacker to execute arbitrary scripts in the context of the victim's browser session. This can lead to session hijacking, redirection to malicious sites, injection of advertisements, defacement, or theft of sensitive information. The reference notes that this type of vulnerability is moderately dangerous and expected to be used in mass-exploit campaigns targeting thousands of websites regardless of size or popularity [1].

To mitigate the vulnerability, users should update JetEngine to version 3.8.1 or later, which contains the fix. For those unable to update immediately, Patchstack offers a mitigation rule that blocks attacks until the update can be applied. It is strongly recommended to apply the update as soon as possible to prevent exploitation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.