Description
The Qi Blocks plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.4.3. This is due to the plugin storing arbitrary CSS styles submitted via the `qi-blocks/v1/update-styles` REST API endpoint without proper sanitization in the `update_global_styles_callback()` function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary CSS, which can be used to perform actions such as hiding content, overlaying fake UI elements, or exfiltrating sensitive information via CSS injection techniques.
Published: 2025-11-01
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated CSS injection via the Qi Blocks REST API allowing content manipulation and potential data exfiltration
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the Qi Blocks WordPress plugin arises from a missing authorization check on the update-styles REST endpoint. Users with Contributor-level access can submit arbitrary CSS, which the plugin stores without sanitization. The injected CSS can hide or replace page elements, create deceptive UI overlays, or extract user data through CSS-based exfiltration techniques, thereby compromising the integrity and appearance of the site.

Affected Systems

The Qi Blocks plugin by qodeinteractive, versions up to and including 1.4.3, is affected. WordPress sites that have installed this plugin and have Contributor or higher roles are susceptible.

Risk and Exploitability

The CVSS score of 4.3 indicates a low severity vulnerability, and the EPSS score of less than 1% suggests a very low probability of exploitation at the time of analysis. Because the flaw requires authenticated access, exploitation depends on the existence of Contributor or higher accounts. The vulnerability is not listed in CISA’s KEV catalog, but the potential for UI deception and data leakage warrants prompt remediation.

Generated by OpenCVE AI on April 22, 2026 at 12:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Qi Blocks plugin to version 1.4.4 or later, where the REST endpoint includes proper authorization checks.
  • If an immediate upgrade is unavailable, restrict Contributor and other non-admin roles from accessing REST endpoints, or disable the update-styles endpoint via custom code or a security plugin.
  • Implement a custom plugin or snippet to sanitize or reject CSS submissions from non-superadmin users, ensuring only administrators can modify global styles.

Generated by OpenCVE AI on April 22, 2026 at 12:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Qodeinteractive
Qodeinteractive qi Blocks
Wordpress
Wordpress wordpress
Vendors & Products Qodeinteractive
Qodeinteractive qi Blocks
Wordpress
Wordpress wordpress

Sat, 01 Nov 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Qi Blocks plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.4.3. This is due to the plugin storing arbitrary CSS styles submitted via the `qi-blocks/v1/update-styles` REST API endpoint without proper sanitization in the `update_global_styles_callback()` function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary CSS, which can be used to perform actions such as hiding content, overlaying fake UI elements, or exfiltrating sensitive information via CSS injection techniques.
Title Qi Blocks <= 1.4.3 - Missing Authorization to Authenticated (Contributor+) Plugin Settings Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Qodeinteractive Qi Blocks
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:00.673Z

Reserved: 2025-10-24T18:56:36.046Z

Link: CVE-2025-12180

cve-icon Vulnrichment

Updated: 2025-11-03T13:10:49.716Z

cve-icon NVD

Status : Deferred

Published: 2025-11-01T06:15:40.517

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:45:17Z

Weaknesses