Nova Blocks by Pixelgrade Vulnerability (Medium) – CVE-2026-24528

Nova Blocks by Pixelgrade Vulnerability (Medium) – CVE-2026-24528

by | Feb 10, 2026 | Plugins

Attack Vectors

CVE-2026-24528 affects the WordPress plugin Nova Blocks by Pixelgrade (slug: nova-blocks) in versions 2.1.9 and earlier. It is a Medium severity issue (CVSS 6.4) involving stored cross-site scripting (XSS), where malicious code can be saved into site content and then run later when others view that content.

The key risk scenario is an attacker who already has an authenticated WordPress account with Contributor-level permissions or higher. In many organizations, contributor access is granted to interns, contractors, agencies, or multiple departments—so the “inside the login” requirement does not eliminate risk. Once injected into a page or post, the script can execute whenever a user visits the affected content, potentially impacting staff, customers, or partners who browse the site.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping in Nova Blocks versions up to and including 2.1.9. In plain terms: the plugin does not adequately clean certain inputs before saving them, and does not consistently ensure that what gets displayed to visitors is safe to render in the browser.

This combination enables stored XSS, which is especially concerning for business teams because it can persist quietly in normal-looking content and trigger repeatedly—without requiring users to click a suspicious link.

Technical or Business Impacts

Brand and customer trust: Injected scripts can alter on-page content, redirect users, or display fraudulent messages. Even short-lived incidents can damage brand credibility, increase bounce rates, and reduce conversion performance on key marketing pages.

Account and data exposure risks: Because the script runs in a visitor’s browser when they view an injected page, it can potentially interact with session data and user actions. This can create risk for administrative users who review content, as well as for logged-in customers depending on how the site is configured.

Compliance and governance concerns: A stored XSS incident can become a reportable event depending on what data is exposed and your regulatory obligations. It also raises internal control questions around least-privilege access, contributor management, and third-party publishing workflows.

Operational disruption: Remediation may require auditing recent content changes, reviewing contributor accounts, and cleaning injected content—pulling time away from campaigns and creating unplanned downtime for high-value pages.

Recommended action: Update Nova Blocks to version 2.1.10 or a newer patched release as the primary remediation step, and review which users have Contributor (or higher) access as part of a broader risk-reduction effort.

Similar Attacks

Stored XSS vulnerabilities are a well-known pattern in web applications and CMS ecosystems, and they are frequently abused to manipulate site content or target privileged users who routinely review pages and posts. Here are a few real examples for context:

CISA Alert: Ongoing Malicious Activity Exploiting Recently Disclosed WordPress Plugin Vulnerabilities

Wordfence Blog (real-world WordPress vulnerability exploitation reporting)

CVE Record for CVE-2026-24528

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers