The recent discovery of the CVE-2026-2028 vulnerability within the Maxi Blocks plugin for WordPress has raised alarms for server administrators and hosting providers. This vulnerability allows authenticated attackers to delete arbitrary media files, posing significant risks to server security and data integrity.
The MaxiBlocks Builder plugin, up to version 2.1.8, lacks proper file ownership validation, particularly in the 'maxi_remove_custom_image_size' AJAX action. This weakness enables attackers with Author-level access — or higher — to delete files located in the wp-content/uploads directory. The implications are severe, as attackers can target media files uploaded by all users, including administrators.
This vulnerability is a crucial concern because it exposes hosting environments to content tampering. A successful exploit not only disrupts operations but can also compromise the trust of your users. Attacks on web server security can lead to broader brute-force attacks and compromise sensitive data. Therefore, proactive malware detection is essential to safeguard against such vulnerabilities.
To protect your web applications and servers, consider the following practical steps:
Strengthening your server security is vital in this landscape of frequent vulnerabilities. Take action today to ensure the protection of your infrastructure. Sign up for BitNinja's free 7-day trial and explore how our solution can enhance your server security!




