CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-5223

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00079/1

CVE-2024-5223: Stored Cross-Site Scripting (XSS) vulnerability in WordPress PostX Plugin. Authenticated attackers with author-level access can inject malicious scripts.

CVE-2024-5223 is a stored XSS vulnerability affecting the Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress versions up to 4.1.1. The vulnerability arises from insufficient sanitization of user-supplied input and inadequate output escaping during file uploads. Attackers with author-level permissions or higher can inject arbitrary web scripts into pages. When a user visits a compromised page, the injected scripts execute, potentially leading to account compromise, data theft, or malware distribution. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 30 and it is tagged as "In The Wild," indicating some level of real-world exploitation, so patching is recommended despite the low CVSS. Website administrators using the PostX plugin should update to the latest version as soon as possible to mitigate this risk. This vulnerability allows malicious actors to perform actions on behalf of unsuspecting users.

In The Wild
2024-05-30

2024-05-30

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-5223 | Post Grid Gutenberg Blocks and Blog Plugin up to 4.1.1 on WordPress cross site scripting
vuldb.com2025-03-27
CVE-2024-5223 | Post Grid Gutenberg Blocks and Blog Plugin up to 4.1.1 on WordPress cross site scripting | A vulnerability was found in Post Grid Gutenberg Blocks and Blog Plugin up to 4.1.1 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2024-5223. It is possible to initiate the attack remotely
vuldb.com
rss
forum
news

Social Media

CVE-2024-5223 The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file uploading feature in all versions up to, and i... https://t.co/PXCzyLS0as
0
0
0
CVE-2024-5223 The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file uploading featu… https://t.co/6b0cIr0Nkr
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.0.4/addons/custom_font/Custom_Font.php#L13
[email protected]https://plugins.trac.wordpress.org/changeset/3093051/ultimate-post/trunk/addons/custom_font/Custom_Font.php
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/7234d4b9-a575-428a-9d08-2dc62ba41c30?source=cve

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence