We want to draw attention to a high-severity Cross-Site Scripting (XSS) vulnerability discovered in the widely used PostX – Gutenberg Blocks for Post Grid Plugin. This security flaw could allow malicious actors attacker to inject malicious scripts into the affected website, potentially compromising the security of the website and its visitors.

The Cross-Site Scripting (XSS) vulnerability was discovered and responsibly reported by Bob Matyas. It enables attackers to inject malicious scripts, such as redirects, advertisements, and other HTML payloads, into your website, which are executed when unsuspecting guests visit the website.


The vulnerability has a CVSS 3.1 score of 7.1, which is considered to be high. This means that the vulnerability is likely to be exploited and could have a significant impact on the affected system.

Affected Versions:

The vulnerability affects PostX – Gutenberg Blocks for Post Grid plugin versions prior to 3.0.6.


An attacker who successfully exploits this vulnerability could inject malicious scripts into the affected website. These scripts could then be executed by visitors to the website, potentially leading to a variety of security risks, such as:

  • Stealing cookies or session tokens
  • Hijacking user accounts
  • Conducting phishing attacks
  • Displaying malicious content


To protect the website from potential exploitation and enhance WordPress security, immediate action is essential:

  1. Update Immediately: Update the WordPress PostX – Gutenberg Blocks for Post Grid Plugin to version 3.0.6 or higher without delay. The latest version contains essential patches to eliminate the XSS vulnerability and bolster overall plugin security.
  2. Regular Security Audits: Conduct regular security audits of the WordPress website to identify and address potential vulnerabilities proactively.
  3. Stay Informed: Monitor official updates and announcements regarding the PostX – Gutenberg Blocks for Post Grid Plugin to be informed about any potential fixes or patches.