Page Builder Gutenberg Blocks – CoBlocks Vulnerability (Medium) – C…

Page Builder Gutenberg Blocks – CoBlocks Vulnerability (Medium) – C…

by | Feb 26, 2026 | Plugins

Attack Vectors

Page Builder Gutenberg Blocks – CoBlocks (slug: coblocks) versions up to and including 3.1.16 are affected by a medium-severity stored cross-site scripting (XSS) issue (CVE-2026-27094, CVSS 6.4).

The primary attack path requires a user to already be logged into WordPress with at least Contributor permissions (or higher). An attacker with that level of access could place malicious script content into a page or content area that uses CoBlocks, resulting in the script being stored in your site’s content and executing later when someone views the infected page.

This matters for organizations that allow many internal users, contractors, or partners to create or edit content. It also raises the risk from “account compromise” scenarios (e.g., a contributor’s credentials are stolen), because the attacker can then use legitimate access to plant persistent malicious code into your website content.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping. In business terms, this means the plugin does not consistently treat user-supplied content as untrusted, allowing harmful scripts to be saved and later displayed to other visitors or logged-in users.

Because this is a stored XSS issue, the malicious code can persist over time until the affected content is found and removed. The impact can extend beyond the original contributor account, especially if higher-privilege users (such as Editors or Administrators) view the infected content in the WordPress dashboard or on the public site.

At the time of the advisory, there is no known patch available. Remediation guidance therefore depends on your organization’s risk tolerance and your need for the plugin’s functionality.

Technical or Business Impacts

Stored XSS issues commonly translate into real business risks: brand damage, loss of customer trust, and increased exposure to fraud or data privacy incidents. If malicious scripts run in a user’s browser, they can potentially manipulate what the user sees, redirect visitors to unsafe destinations, or interfere with normal site behavior.

For marketing and revenue teams, this can mean compromised landing pages, altered calls-to-action, damaged SEO performance, and reduced conversion rates due to trust warnings or suspicious behavior. For executives and compliance teams, it can mean heightened audit findings, incident response costs, and potential legal exposure depending on what data is accessed and what user populations are affected.

Given the medium severity and the requirement for authenticated access (Contributor+), the practical risk is often highest in organizations with many content authors or where contributor accounts are widely distributed. With no patch currently available, many organizations will consider uninstalling Page Builder Gutenberg Blocks – CoBlocks and replacing it, or applying compensating controls (such as reducing contributor permissions, tightening publishing workflows, and monitoring for unexpected script tags in content) to reduce exposure while evaluating alternatives.

References: CVE-2026-27094 | Wordfence advisory

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers