Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-01-09

CVE-2025-14943: Blog2Social: Social Media Auto Post & Scheduler <= 8.7.2 – Incorrect Authorization to Authenticated (Subscriber+) Sensitive Information Exposure (blog2social)

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 8.7.2. This is due to a misconfigured authorization check on the 'getShipItemFullText' function which only verifies that a user has the 'read' capability (Subscriber-level) and a valid nonce, but fails to…
2026-01-09

CVE-2026-24630: Stylish Cost Calculator <= 8.1.9 – Authenticated (Contributor+) Stored Cross-Site Scripting (stylish-cost-calculator)

The Stylish Cost Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 8.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an…
2026-01-09

CVE-2026-24629: Web Accessibility with Max Access <= 2.1.0 – Authenticated (Administrator+) Stored Cross-Site Scripting (accessibility-toolbar)

The Web Accessibility with Max Access plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user…
2026-01-09

CVE-2026-24633: Add Expires Headers & Optimized Minify <= 3.1.0 – Missing Authorization (add-expires-headers)

The Add Expires Headers & Optimized Minify plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 3.1.0. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-09

CVE-2025-14976: User Registration & Membership <= 4.4.8 – Cross-Site Request Forgery to Arbitrary Post Deletion (user-registration)

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.8. This is due to missing or incorrect nonce validation on the 'process_row_actions' function with the 'delete' action. This…
2026-01-09

CVE-2026-0831: Templately <= 3.4.8 – Unauthenticated Limited Arbitrary JSON File Write (templately)

The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to…
2026-01-08

CVE-2025-32123: HTML5 Video Player with Playlist & Multiple Skins <= 5.3.5 – Reflected Cross-Site Scripting (lbg-vp2-html5-rightside)

The HTML5 Video Player with Playlist & Multiple Skins plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a…
2026-01-08

CVE-2025-27005: HTML5 Video Player <= 5.3.5 – Reflected Cross-Site Scripting (lbg-vp2-html5-bottom)

The HTML5 Video Player plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action…
2026-01-08

CVE-2025-47666: Image&Video FullScreen Background <= 1.6.7 – Reflected Cross-Site Scripting (lbg_fullscreen_fullwidth_slider)

The Image&Video FullScreen Background plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.6.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action…
2026-01-08

CVE-2025-49043: Magic Responsive Slider and Carousel WordPress <= 1.6 – Reflected Cross-Site Scripting (magic_carousel)

The Magic Responsive Slider and Carousel WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works