Stored Cross-Site Scripting Vulnerability in Maxi Blocks Plugin for WordPress
CVE-2026-6378

6.4MEDIUM

What is CVE-2026-6378?

The Maxi Blocks plugin for WordPress is susceptible to stored cross-site scripting through the /wp-json/maxi-blocks/v1.0/style-card REST API endpoint. This vulnerability arises from inadequate input sanitization and output escaping of the sc_styles parameter in all versions up to and including 2.1.9. Authenticated adversaries with Author-level permissions can exploit this vulnerability to inject malicious scripts that execute on every page where the plugin's styles are applied, including the entire WordPress admin panel, potentially compromising the integrity and security of the site.

Affected Version(s)

MaxiBlocks Builder | 17,000+ Design Assets, Patterns, Icons & Starter Sites 0 <= 2.1.9

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Athiwat Tiprasaharn
.