Description
The Post Grid Master plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘argsArray['read_more_text']’ parameter in all versions up to, and including, 3.4.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-07-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting (XSS)
Action: Apply Patch
AI Analysis

Impact

The Post Grid Master plugin processes the argsArray['read_more_text'] parameter without proper sanitization or escaping, allowing an unauthenticated attacker to inject malicious JavaScript that is reflected back into the page. When the victim visits the crafted URL, the injected code executes in the context of the target site, enabling credential theft, session hijacking, defacement, or other client‑side attacks. This vulnerability is a classic instance of CWE‑79, a reflected XSS weakness.

Affected Systems

The weakness affects the WordPress plugin "Post Grid Master" supplied by mdshuvo. All releases up to and including version 3.4.13 are vulnerable. No fixed version is specified in the CVE payload, so the status of newer releases remains unknown.

Risk and Exploitability

With a CVSS base score of 6.1, the flaw is considered moderate severity. The EPSS score of less than 1% indicates a low likelihood that attackers are actively exploiting it, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is a reflected XSS that requires an end‑user to interact with a malicious link or page, so the threat is limited to users visiting a compromised or crafted URL.

Generated by OpenCVE AI on April 22, 2026 at 17:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest available version of Post Grid Master once the vendor confirms the vulnerability is fixed.
  • If upgrading immediately is not feasible, temporarily disable or cleanse the read_more_text parameter to eliminate the XSS vector.
  • Implement a web application firewall or a content security policy that blocks execution of unexpected inline scripts as an additional layer of defense.

Generated by OpenCVE AI on April 22, 2026 at 17:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22509 The Post Grid Master plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘argsArray['read_more_text']’ parameter in all versions up to, and including, 3.4.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Wed, 08 Apr 2026 17:00:00 +0000


Mon, 11 Aug 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Addonmaster
Addonmaster post Grid Master
CPEs cpe:2.3:a:addonmaster:post_grid_master:*:*:*:*:*:wordpress:*:*
Vendors & Products Addonmaster
Addonmaster post Grid Master

Thu, 24 Jul 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 24 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Post Grid Master plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘argsArray['read_more_text']’ parameter in all versions up to, and including, 3.4.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Post Grid Master <= 3.4.13 - Reflected Cross-Site Scripting via argsArray['read_more_text']
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Addonmaster Post Grid Master
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:34:07.683Z

Reserved: 2025-05-22T09:02:21.166Z

Link: CVE-2025-5084

cve-icon Vulnrichment

Updated: 2025-07-24T13:15:52.104Z

cve-icon NVD

Status : Modified

Published: 2025-07-24T10:15:26.643

Modified: 2026-04-08T17:20:47.247

Link: CVE-2025-5084

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:15:22Z

Weaknesses