CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Lifecycle Timeline
2DescriptionNVD
The Cinza Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'cgrid_skin_content' post meta field in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AnalysisAI
Stored cross-site scripting in Cinza Grid WordPress plugin versions up to 1.2.1 allows authenticated contributors and above to inject arbitrary JavaScript into pages via the 'cgrid_skin_content' post meta field, which executes when other users view the affected pages. The vulnerability stems from missing input sanitization and output escaping in backend processing functions. CVSS 6.4 reflects moderate impact with network-accessible attack surface, though exploitation requires valid WordPress contributor-level credentials.
Technical ContextAI
The Cinza Grid plugin for WordPress fails to properly sanitize user input in the 'cgrid_skin_content' post meta field and does not escape output when rendering this data, resulting in a stored XSS vulnerability (CWE-79). The affected code paths are in includes/backend-cpts.php (line 733) and includes/backend-shortcodes.php (line 511), where post meta values are processed without adequate HTML/JavaScript entity encoding. Since WordPress stores post meta as serialized PHP data, unsanitized content persists in the database and executes in the browser context of any user viewing the affected page, regardless of their privilege level.
Affected ProductsAI
Cinza Grid WordPress plugin versions 1.2.1 and earlier are affected. The plugin is distributed through the official WordPress plugin repository at plugins.trac.wordpress.org/browser/cinza-grid. Administrators using versions up to and including 1.2.1 should prioritize remediation. The exact CPE for this plugin is not independently standardized in NVD, but references point to the WordPress plugin repository changeset 3381619 where the fix was applied.
RemediationAI
Update the Cinza Grid plugin to version 1.2.2 or later, which includes fixes for input sanitization and output escaping in the affected post meta fields. Administrators can update via the WordPress plugin dashboard (Plugins → Updates) or by downloading the latest version from the official WordPress plugin repository. No workaround is available short of deactivating the plugin; sites must apply the patch to restore security. See Wordfence threat intelligence (https://www.wordfence.com/threat-intel/vulnerabilities/id/9acec3df-84d6-4cea-8756-64fbb468e5e0) for additional context and confirmation of the patched version.
Share
External POC / Exploit Code
Leaving vuln.today