The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator.
History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.47918}

epss

{'score': 0.52703}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:34:02.520Z

Reserved: 2024-05-24T16:37:41.847Z

Link: CVE-2024-5326

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.432Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-30T11:15:30.970

Modified: 2026-04-08T17:19:01.780

Link: CVE-2024-5326

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.