Impact
The PostX plugin for WordPress contains a missing capability check on the REST API endpoint /ultp/v2/get_dynamic_content/. This flaw allows an unauthenticated user to send requests to the endpoint and retrieve sensitive metadata belonging to site users, including password hashes. The impact is a clear breach of confidentiality for all users of the affected installation.
Affected Systems
WordPress sites using the Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin, versions up to and including 5.0.3, are affected. Users should verify the installed major version and confirm it is 5.0.4 or later to avoid the vulnerability.
Risk and Exploitability
The CVSS score of 7.5 classifies this vulnerability as high severity, and the EPSS score of less than 1% indicates a low probability of exploitation at present. Because the flaw exists on a publicly accessible REST endpoint, an attacker can exploit it without authentication or special network access, but the mitigation strategy focuses on timely patching rather than waiting for malicious activity. The vulnerability is not yet listed in the CISA KEV catalog.
OpenCVE Enrichment