Browse all 3 CVE security advisories affecting ckp267. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ckp267 is primarily used in enterprise environments for network monitoring and security analytics. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with three CVEs currently documented. The software's complex architecture and extensive API surface have contributed to these security issues. While no major public incidents have been widely reported, the presence of multiple CVEs indicates ongoing security challenges that require regular patching and careful configuration. Organizations implementing ckp267 should prioritize security hardening and continuous monitoring to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-6378 | Maxi Blocks <= 2.1.9 - Authenticated (Author+) Stored Cross-Site Scripting via Style Card REST API — MaxiBlocks Builder | 17,000+ Design Assets, Patterns, Icons & Starter SitesCWE-79 | 6.4 | Medium | 2026-05-02 |
| CVE-2026-2028 | Maxi Blocks <= 2.1.8 - Missing Authorization to Authenticated (Author+) Media File Deletion via 'old_media_src' Parameter — MaxiBlocks Builder | 17,000+ Design Assets, Patterns, Icons & Starter SitesCWE-639 | 5.3 | Medium | 2026-04-24 |
| CVE-2024-6885 | MaxiBlocks: 2200+ Patterns, 190 Pages, 14.2K Icons & 100 Styles <= 1.9.2 - Authenticated (Subscriber+) Arbitrary File Deletion — MaxiBlocks Builder | 17,000+ Design Assets, Patterns, Icons & Starter SitesCWE-22 | 8.1 | High | 2024-07-23 |
This page lists every published CVE security advisory associated with ckp267. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.