Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5326: CWE-862 Missing Authorization in wpxpo Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX

0
High
VulnerabilityCVE-2024-5326cvecve-2024-5326cwe-862
Published: Thu May 30 2024 (05/30/2024, 10:59:29 UTC)
Source: CVE Database V5
Vendor/Project: wpxpo
Product: Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX

Description

CVE-2024-5326 is a high-severity vulnerability in the Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX affecting all versions up to 4. 1. 2. It arises from a missing authorization check in the 'postx_presets_callback' function, allowing authenticated users with Contributor-level access or higher to modify arbitrary plugin options. Exploitation can enable new user registrations and set the default role for new users to Administrator, effectively allowing privilege escalation. The vulnerability has a CVSS score of 8. 8, indicating high impact on confidentiality, integrity, and availability without requiring user interaction. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent unauthorized administrative access. Countries with significant WordPress usage and large online presence are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:32:16 UTC

Technical Analysis

CVE-2024-5326 is a critical authorization bypass vulnerability identified in the Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX, a popular WordPress plugin used for displaying posts in grid layouts. The root cause is a missing capability check in the 'postx_presets_callback' function, which is responsible for handling certain plugin options. This flaw allows any authenticated user with at least Contributor-level privileges to modify plugin settings arbitrarily. Specifically, attackers can enable new user registrations and assign the default role of Administrator to newly created users. This results in a severe privilege escalation scenario where low-privileged users can gain full administrative control over the affected WordPress site. The vulnerability affects all versions up to and including 4.1.2. The CVSS v3.1 score of 8.8 reflects the network exploitable nature (no user interaction required), low attack complexity, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the ease of exploitation and potential damage make this a critical issue for site administrators. The vulnerability was publicly disclosed on May 30, 2024, by Wordfence, and no official patches or updates have been linked yet, emphasizing the need for immediate mitigation.

Potential Impact

The impact of CVE-2024-5326 is significant for organizations running WordPress sites with the vulnerable PostX plugin. Attackers with Contributor-level access can escalate privileges to Administrator by manipulating plugin settings, leading to full site compromise. This includes the ability to install malicious plugins, alter site content, steal sensitive data, and disrupt site availability. The unauthorized creation of administrator accounts undermines the integrity and confidentiality of the entire WordPress installation. For businesses, this can result in data breaches, reputational damage, loss of customer trust, and potential regulatory penalties. Since WordPress powers a substantial portion of websites globally, including e-commerce, media, and corporate sites, the scope of affected systems is broad. The vulnerability’s network exploitability and lack of user interaction requirement increase the likelihood of automated or targeted attacks, especially in environments where Contributor roles are assigned to multiple users or external collaborators.

Mitigation Recommendations

To mitigate CVE-2024-5326, organizations should immediately audit user roles and permissions to ensure that only trusted individuals have Contributor-level or higher access. Until an official patch is released, consider disabling or removing the PostX plugin if it is not essential. If removal is not feasible, restrict access to the plugin’s AJAX endpoints by implementing web application firewall (WAF) rules that block unauthorized requests to 'postx_presets_callback'. Additionally, monitor logs for suspicious activity related to user registration and role changes. Employ multi-factor authentication (MFA) for all administrative accounts to reduce the risk of compromised credentials. Regularly back up WordPress sites to enable recovery in case of compromise. Stay informed about updates from the plugin vendor and apply patches promptly once available. Finally, educate site administrators and contributors about the risks of privilege escalation and the importance of minimal privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-05-24T16:37:41.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6be5b7ef31ef0b55be1e

Added to database: 2/25/2026, 9:38:45 PM

Last enriched: 2/26/2026, 2:32:16 AM

Last updated: 2/26/2026, 8:04:36 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats