I'm not mathematically expertized, so this is provided as foundation for further reasoning, development, and refutation. My feeling right now is that, exploitation is difficult, but may be viable.
Effect of Unvalidated X (little)
Because operands are processed in modular arithmetic, an out-of-range X poses little threat. But it can nonetheless lead to an invalid Y.
Key Recovery Attack
Referencing https://safecurves.cr.yp.to/twist.html for background knowledge, here's a list of preconditions that are required to carry out a key recovery attack on an elliptic-curve decryption oracle:
the decryption oracle accepts an ECC ciphertext in the exact fashion as described in the OP's question - that is, a compressed point for key-consensus, and a symmetric-key encrypted ciphertext payload.
the key-consensus ECC point is on an "invalid" curve, where the so called "invalid curve attack" in the referenced URL is carried out. The point may be valid on that curve, but will not pass proper validation on the decryption oracle's "real" curve.
Such invalid curve attack would've been otherwise impossible if the implementation properly validate both uncompressed and compressed ECC points, but it's the assumption in the OP's question that parsing of compressed ECC points is improperly implemented.
Notice that I didn't say ECIES and I only said elliptic-curve decryption oracle. This is because ECIES uses authenticated encryption for the ciphertext payload, which constitutes an extra layer of defense. ECDHE may be vulnerable, but for the major curves in widespread use listed in the referenced URL, the difficulty of combined mathematical-theoretic analysis (small subgroup + invalid curve) is close to being as difficult as brutal-force - which is almost twice as difficult as plain Pollard-rho.
Digital Signature Forgery (Conjectured)
Most forms of DSS over Weierstrass involve generating an ephemeral key-pair:
Attacker may construct an invalid ephemeral key-pair to produce a valid signature that can be verified using another invalid public ECC point. Right now, I have no idea how this may be worked, but I conjecture that it's possible, at least in some implementations[1] and for some formula of ECDSA (e.g. ANSI/SEC#1 ECDSA, Chinese SM2-ECDSA, etc.)
This attack is very limited.
when reconstructing $v$ for check with $r$, the verification public key must be an invalid one provided by the attacker - otherwise, the right hand of the verification equation (i.e. the side involving base point $G$ and verification key $Q_A$) will revert to a valid point in the group generated by $G$.
the attacker must convince the verification agent to use the invalid public key - for software agents, the attacker might as well request a certificate using a valid public key; it may be only limitedly meaningful if the target is some kind of HSM.
[1]: For example, implementations using the SEC#1 spec's simple formula may be more vulnerable than implementations using some kind of complete formula, as the simple formula doesn't involve $b$ - the constant term in the right-hand of the curve equation.