Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-04-09

CVE-2026-6443: Accordion and Accordion Slider 1.4.6 – Injected Backdoor (accordion-and-accordion-slider)

The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This makes it possible for the threat actor to maintain a persistent backdoor and…
2026-04-09

CVE-2026-4977: UsersWP <= 1.2.58 – Authenticated (Subscriber+) Restricted Usermeta Modification via 'htmlvar' Parameter (userswp)

The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress is vulnerable to Improper Access Control in all versions up to, and including, 1.2.58 This is due to insufficient field-level permission validation in the upload_file_remove() AJAX handler where the $htmlvar parameter is not validated against a whitelist of allowed…
2026-04-09

CVE-2026-1263: Webling <= 3.9.0 – Authenticated (Subscriber+) Stored Cross-Site Scripting via 'title' Parameter (webling)

The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.9.0 due to insufficient input sanitization, insufficient output escaping, and missing capabilities checks in the 'webling_admin_save_form' and 'webling_admin_save_memberlist' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject Webling forms and memberlists…
2026-04-09

CVE-2026-3360: Tutor LMS <= 3.9.7 – Missing Authorization to Unauthenticated Arbitrary Billing Profile Overwrite via 'order_id' Parameter (tutor)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pay_incomplete_order()` function. The function accepts an attacker-controlled `order_id` parameter and uses it to look up order…
2026-04-09

CVE-2026-4305: Royal WordPress Backup & Restore Plugin <= 1.0.16 – Reflected Cross-Site Scripting via 'wpr_pending_template' Parameter (royal-backup-reset)

The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.16 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an…
2026-04-09

CVE-2026-4664: Customer Reviews for WooCommerce <= 5.103.0 – Unauthenticated Authentication Bypass to Arbitrary Review Submission via 'key' Parameter (customer-reviews-woocommerce)

The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.103.0. This is due to the `create_review_permissions_check()` function comparing the user-supplied `key` parameter against the order's `ivole_secret_key` meta value using strict equality (`===`), without verifying that the stored key is non-empty. For orders where no…
2026-04-09

CVE-2026-1924: Aruba HiSpeed Cache <= 3.0.4 – Cross-Site Request Forgery to Plugin Settings Reset (aruba-hispeed-cache)

The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing nonce verification on the `ahsc_ajax_reset_options()` function. This makes it possible for unauthenticated attackers to reset all plugin settings to their default values via a forged request granted they can…
2026-04-09

CVE-2026-4162: Gravity SMTP <= 2.1.4 – Missing Authorization to Authenticated (Subscriber+) Plugin Uninstall (gravitysmtp)

The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.4. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to uninstall and deactivate the plugin and…
2026-04-09

CVE-2026-6443: Essentialplugin Plugins (Various Versions) – Injected Backdoor (sp-news-and-widget)

All plugins by Essentialplugin for WordPress are vulnerable to an injected backdoor in various versions. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This makes it possible for the threat actor to maintain a persistent backdoor and inject spam…
2026-04-09

CVE-2026-6443: Essentialplugin Plugins (Various Versions) – Injected Backdoor (wp-logo-showcase-responsive-slider-slider)

All plugins by Essentialplugin for WordPress are vulnerable to an injected backdoor in various versions. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This makes it possible for the threat actor to maintain a persistent backdoor and inject spam…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works