PT-2026-36560 · WordPress · Maxiblocks
Athiwat Tiprasaharn
·
Published
2026-05-02
·
Updated
2026-05-02
·
CVE-2026-6378
CVSS v3.1
6.4
Medium
| Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
Maxi Blocks versions prior to 2.2.0
Description
The Maxi Blocks plugin for WordPress contains a stored cross-site scripting issue. This occurs due to insufficient input sanitization and output escaping of the
sc styles parameter within the '/wp-json/maxi-blocks/v1.0/style-card' REST API endpoint. Authenticated attackers with Author-level access or higher can inject arbitrary web scripts that execute on every page where the plugin's style card styles are loaded, including the entire WordPress admin panel.Recommendations
Update the plugin to a version later than 2.1.9.
As a temporary workaround, restrict access to the '/wp-json/maxi-blocks/v1.0/style-card' endpoint or avoid using the
sc styles parameter until the update is applied.Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Maxiblocks