
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-16
CVE-2025-14478: Demo Importer Plus <= 2.0.9 – Authenticated (Author+) Blind XML External Entity Injection via SVG File Upload (demo-importer-plus)
The Demo Importer Plus plugin for WordPress is vulnerable to XML External Entity Injection (XXE) in all versions up to, and including, 2.0.9 via the SVG file upload functionality. This makes it possible for authenticated attackers, with Author-level access and above, to achieve code execution in vulnerable configurations. This only impacts sites on versions of…
2026-01-16
CVE-2025-68871: Dooodl <= 2.3.0 – Reflected Cross-Site Scripting (dooodl)
The Dooodl plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 2.3.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as…
2026-01-16
CVE-2026-23800: Modular DS 2.5.2 – Unauthenticated Privilege Escalation (modular-connector)
The Modular DS: Monitor, update, and backup multiple websites plugin for WordPress is vulnerable to Privilege Escalation in version 2.5.2. This makes it possible for unauthenticated attackers to escalate their privileges to that of an administrator.
2026-01-16
CVE-2026-24386: Element Invader – Template Kits for Elementor <= 1.2.4 – Missing Authorization (elementinvader)
The Element Invader – Template Kits for Elementor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.
2026-01-16
CVE-2025-68849: Quote Master <= 7.1.1 – Reflected Cross-Site Scripting (quote-master)
The Quote Master plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 7.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such…
2026-01-16
CVE-2026-25004: CM Business Directory – Optimise and showcase local business <= 1.5.3 – Authenticated (Author+) Stored Cross-Site Scripting (cm-business-directory)
The CM Business Directory – Optimise and showcase local business plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will…
2026-01-16
CVE-2025-12984: Advanced Ads – Ad Manager & AdSense <= 2.0.15 – Authenticated (Admin+) SQL Injection (advanced-ads)
The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 2.0.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level…
2026-01-16
CVE-2025-67942: Peach Payments Gateway <= 3.3.6 – Missing Authorization (wc-peach-payments-gateway)
The Peach Payments Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.3.6. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-16
CVE-2025-12825: User Registration Using Contact Form 7 <= 2.5 – Authenticated (Subscriber+) Information Exposure (user-registration-using-contact-form-7)
The User Registration Using Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_cf7_form_data' function in all versions up to, and including, 2.5. This makes it possible for unauthenticated attackers to retrieve form settings which includes Facebook app secrets.
2026-01-16
CVE-2026-24593: AWP Classifieds <= 4.4.3 – Unauthenticated Information Exposure (another-wordpress-classifieds-plugin)
The AWP Classifieds plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.3. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
