
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-16
CVE-2025-31413: Element Pack Elementor Addons <= 8.3.13 – Cross-Site Request Forgery (bdthemes-element-pack-lite)
The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 8.3.13. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized action granted they can trick a site administrator into…
2026-01-16
CVE-2025-14450: Wallet System for WooCommerce <= 2.7.2 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Wallet Balance Manipulation (wallet-system-for-woocommerce)
The Wallet System for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'change_wallet_fund_request_status_callback' function in all versions up to, and including, 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to manipulate wallet withdrawal requests and arbitrarily increase their wallet…
2026-01-16
CVE-2025-15403: RegistrationMagic <= 6.0.7.1 – Privilege Escalation via admin_order (custom-registration-form-builder-with-submission-manager)
The RegistrationMagic plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.0.7.1. This is due to the 'add_menu' function is accessible via the 'rm_user_exists' AJAX action and allows arbitrary updates to the 'admin_order' setting. This makes it possible for unauthenticated attackers to injecting an empty slug into the order…
2026-01-16
CVE-2025-68008: Mail <= 1.3 – Reflected Cross-Site Scripting (wp-mail)
The Mail plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as…
2026-01-16
CVE-2025-67939: Tickera <= 3.5.6.2 – Missing Authorization (tickera-event-ticketing-system)
The Tickera – Sell Tickets & Manage Events plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.5.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.
2026-01-16
CVE-2026-0682: Church Admin <= 5.0.28 – Authenticated (Administrator+) Blind Server-Side Request Forgery via 'audio_url' Parameter (church-admin)
The Church Admin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.28 due to insufficient validation of user-supplied URLs in the 'audio_url' parameter. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to arbitrary locations originating from the web application and can…
2026-01-16
CVE-2025-14632: Filr – Secure document library <= 1.2.11 – Authenticated (Administrator+) Stored Cross-Site Scripting via HTML Upload (filr-protection)
The Filr – Secure document library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via unrestricted file upload in all versions up to, and including, 1.2.11 due to insufficient file type restrictions in the FILR_Uploader class. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload malicious HTML files containing…
2026-01-16
CVE-2025-14075: WP Hotel Booking <= 2.2.7 – Unauthenticated Sensitive Information Exposure via 'email' Parameter (wp-hotel-booking)
The WP Hotel Booking plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.7. This is due to the plugin exposing the 'hotel_booking_fetch_customer_info' AJAX action to unauthenticated users without proper capability checks, relying only on a nonce for protection. This makes it possible for unauthenticated attackers to retrieve…
2026-01-16
CVE-2025-12718: Quick Contact Form <= 8.2.6 – Unauthenticated Open Mail Relay (quick-contact-form)
The Quick Contact Form plugin for WordPress is vulnerable to Open Mail Relay in all versions up to, and including, 8.2.6. This is due to the 'qcf_validate_form' AJAX endpoint allowing a user controlled parameter to set the 'from' email address. This makes it possible for unauthenticated attackers to send emails to arbitrary recipients utilizing the…
2026-01-16
CVE-2025-12002: Feeds for YouTube Pro <= 2.6.0 – Unauthenticated Arbitrary File Read via Path Traversal (youtube-feed-pro)
The Feeds for YouTube Pro plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.6.0 via the 'sby_check_wp_submit' AJAX action. This is due to insufficient sanitization of user-supplied data and the use of that data in a file operation. This makes it possible for unauthenticated attackers to read…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
