Description
The Maxi Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `/wp-json/maxi-blocks/v1.0/style-card` REST API endpoint in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping of the `sc_styles` parameter. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts that execute on every page where the plugin's style card styles are loaded, including across the entire WordPress admin panel.
Published: 2026-05-02
Score: 6.4 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Maxi Blocks plugin allows an authenticated user with Author or higher privileges to store malicious JavaScript via the sc_styles parameter in the /wp-json/maxi-blocks/v1.0/style-card REST API. The plugin fails to sanitize and escape this input, so when the style card styles are loaded on any page, including the WordPress admin interface, the injected script executes in the context of those browsers. This can lead to session hijacking, credential theft, or other client‑side attacks. The flaw does not provide native remote code execution on the server, but it enables arbitrary script execution in user browsers that view affected content.

Affected Systems

WordPress sites running the Maxi Blocks Builder plugin version 2.1.9 or earlier. The affected code resides in the class‑maxi-api.php and class‑maxi-style-cards.php files of the plugin, accessible through the REST API endpoint /wp-json/maxi-blocks/v1.0/style-card.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium severity vulnerability. Although the EPSS score is not provided, the lack of KEV listing suggests no actively known exploitation. The vulnerability requires authenticated access at Author level or higher, so the attack vector is internal or social engineering to obtain such credentials. Once accessed, the attacker can inject arbitrary scripts that run on every page loading the style card, exposing all site visitors and administrative users to the risk.

Generated by OpenCVE AI on May 2, 2026 at 06:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Maxi Blocks plugin to version 2.1.10 or later, which contains the input sanitization fix for the style-card API endpoint.
  • If an update cannot be performed immediately, consider disabling the /wp-json/maxi-blocks/v1.0/style-card REST API route or deactivating the plugin’s style card functionality through configuration or custom code to prevent the stored JavaScript from being served.
  • Review and limit Author or higher level accounts to only those necessary for site operations to reduce the surface area for potential exploitation.

Generated by OpenCVE AI on May 2, 2026 at 06:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 04:15:00 +0000

Type Values Removed Values Added
Description The Maxi Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `/wp-json/maxi-blocks/v1.0/style-card` REST API endpoint in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping of the `sc_styles` parameter. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts that execute on every page where the plugin's style card styles are loaded, including across the entire WordPress admin panel.
Title Maxi Blocks <= 2.1.9 - Authenticated (Author+) Stored Cross-Site Scripting via Style Card REST API
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T03:36:42.285Z

Reserved: 2026-04-15T17:07:54.863Z

Link: CVE-2026-6378

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T04:16:11.990

Modified: 2026-05-02T04:16:11.990

Link: CVE-2026-6378

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:00:06Z

Weaknesses