Browse all 4 CVE security advisories affecting Jenst. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Jenst is a web application framework primarily used for building dynamic content management systems. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. The framework's modular architecture has introduced additional risks through third-party extensions. While no major public security incidents have been widely documented, its four recorded CVEs highlight consistent issues with sanitization and access controls. Developers implementing Jenst must prioritize hardening configurations and applying security patches to mitigate common exploitation vectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-39423 | WordPress Add to Header plugin <= 1.0 - CSRF to XSS vulnerability — Add to HeaderCWE-352 | 7.1 | High | 2025-04-17 |
| CVE-2025-30574 | WordPress Mobile Navigation plugin <= - 1.5 Cross Site Scripting (XSS) Vulnerability — Mobile NavigationCWE-79 | 5.9 | Medium | 2025-03-24 |
| CVE-2025-27312 | WordPress WP Sitemap plugin <= 1.0 - SQL Injection vulnerability — WP SitemapCWE-89 | 8.5 | High | 2025-02-24 |
| CVE-2025-22342 | WordPress WP Simple Sitemap plugin <= 0.2 - CSRF to Stored XSS vulnerability — WP Simple SitemapCWE-352 | 7.1 | High | 2025-01-07 |
This page lists every published CVE security advisory associated with Jenst. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.