Description
The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Published: 2026-02-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to remote code execution within the ‘LazyBlocks_Blocks’ class. The flaw allows an authenticated user with Contributor-level permissions or higher to execute arbitrary code on the server. This results in full compromise of the installation, permitting attackers to gain any privileges the site’s user accounts possess, leading to possible data theft, site defacement, or further lateral movement.

Affected Systems

WordPress sites running the Custom Block Builder – Lazy Blocks plugin in any version up to and including 4.2.0 are affected. Users should verify the installed plugin version and determine if it falls within the vulnerable range.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.8, indicating a high severity consequence. The EPSS score is currently below 1%, which suggests a low probability of active exploitation at this time. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The attack vector requires authenticated access; therefore, an attacker must first obtain Contributor or higher level privileges on the target WordPress site to exploit the flaw. Once authenticated, the attacker can trigger the vulnerable functions and execute arbitrary code on the server.

Generated by OpenCVE AI on April 15, 2026 at 17:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Custom Block Builder – Lazy Blocks plugin to version 4.2.1 or later.
  • Remove any malicious code or customizations added after the vulnerability was disclosed.
  • Restrict Contributor and higher roles to only the permissions necessary for their tasks, or consider disabling or limiting role elevation for untrusted users.

Generated by OpenCVE AI on April 15, 2026 at 17:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Nko
Nko custom Block Builder – Lazy Blocks
Wordpress
Wordpress wordpress
Vendors & Products Nko
Nko custom Block Builder – Lazy Blocks
Wordpress
Wordpress wordpress

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Title Custom Block Builder – Lazy Blocks <= 4.2.0 - Authenticated (Contributor+) Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Nko Custom Block Builder – Lazy Blocks
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:14.897Z

Reserved: 2026-01-28T19:28:12.274Z

Link: CVE-2026-1560

cve-icon Vulnrichment

Updated: 2026-02-11T15:40:34.510Z

cve-icon NVD

Status : Deferred

Published: 2026-02-11T09:15:51.353

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses