cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2025-0371,https://securityvulnerability.io/vulnerability/CVE-2025-0371,Stored Cross-Site Scripting in JetElements Plugin for WordPress,"The JetElements plugin for WordPress is susceptible to Stored Cross-Site Scripting (XSS) vulnerabilities present in multiple widgets. These vulnerabilities arise from inadequate input sanitization and output escaping on user-supplied attributes, allowing authenticated attackers with contributor-level access and above to inject malicious web scripts. When these scripts are executed, they can compromise the integrity of web pages viewed by users, posing risks to user data and site security.",Wordpress,Jetelements,6.4,MEDIUM,0.00044999999227002263,false,,false,false,false,false,false,false,2025-01-21T08:21:51.697Z,0 CVE-2024-7144,https://securityvulnerability.io/vulnerability/CVE-2024-7144,JetElements Plugin Vulnerable to Stored Cross-Site Scripting,"The JetElements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' and 'slide_id' parameters in all versions up to, and including, 2.6.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",Wordpress,Jetelements,5.4,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-08-16T13:48:56.685Z,0 CVE-2024-7145,https://securityvulnerability.io/vulnerability/CVE-2024-7145,JetElements Plugin Vulnerable to Local File Inclusion Attacks,"The JetElements plugin for WordPress contains a Local File Inclusion vulnerability due to inadequate validation of the 'progress_type' parameter. This flaw is present in all versions up to and including 2.6.20. It allows authenticated attackers with Contributor-level access or higher to include and execute arbitrary files on the server. This capability could potentially lead to the execution of PHP code contained in those files, bypass access controls, and expose sensitive data. The risk is particularly pronounced in scenarios where attackers can upload what appear to be harmless files, such as images.",Wordpress,Jetelements,8.8,HIGH,0.0004900000058114529,false,,false,false,false,,false,false,2024-08-16T13:48:56.036Z,0