
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-04-08
CVE-2026-4336: Ultimate FAQ Accordion Plugin <= 2.4.7 – Authenticated (Author+) Stored Cross-Site Scripting via FAQ Content (ultimate-faqs)
The Ultimate FAQ Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via FAQ content in all versions up to, and including, 2.4.7. This is due to the plugin calling html_entity_decode() on post_content during rendering in the set_display_variables() function (View.FAQ.class.php, line 746), which converts HTML entity-encoded payloads back into executable HTML, combined with insufficient…
2026-04-08
CVE-2026-5357: Download Manager <= 3.3.52 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (download-manager)
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sid' parameter of the 'wpdm_members' shortcode in versions up to and including 3.3.52. This is due to insufficient input sanitization and output escaping on the user-supplied 'sid' shortcode attribute. The sid parameter is extracted without sanitization in the members() function and…
2026-04-08
CVE-2026-1830: Quick Playground <= 1.3.1 – Missing Authorization to Unauthenticated Arbitrary File Upload (quick-playground)
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP…
2026-04-08
CVE-2026-5436: MW WP Form <= 5.1.1 – Unauthenticated Arbitrary File Move via regenerate_upload_file_keys (mw-wp-form)
The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() function, which uses WordPress's path_join() — a function that returns absolute paths unchanged, discarding the intended base…
2026-04-08
CVE-2026-5742: UsersWP <= 1.2.60 – Authenticated (Subscriber+) Stored Cross-Site Scripting via User Badge Link Substitution (userswp)
The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.2.60. This is due to insufficient input sanitization of user-supplied URL fields and improper output escaping when rendering user profile data in badge widgets. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject…
2026-04-08
CVE-2026-39519: GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero-Prompt Content <= 1.2.0 – Unauthenticated SQL Injection (geeky-bot)
The GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero-Prompt Content plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append…
2026-04-08
CVE-2026-39591: WP-BusinessDirectory – Business directory plugin for WordPress <= 4.0.0 – Authenticated (Subscriber+) Arbitrary File Upload (wp-businessdirectory)
The WP-BusinessDirectory – Business directory plugin for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 4.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make…
2026-04-08
CVE-2026-39587: WP BASE Booking of Appointments, Services and Events <= 5.9.0 – Unauthenticated Privilege Escalation (wp-base-booking-of-appointments-services-and-events)
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 5.9.0. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.
2026-04-08
CVE-2026-4326: Vertex Addons for Elementor <= 1.6.4 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation and Activation via 'afeb_activate_required_plugins' (addons-for-elementor-builder)
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate_required_plugins() function. Specifically, the current_user_can('install_plugins') capability check does not terminate execution when it fails — it only sets an error message variable while allowing the…
2026-04-08
CVE-2026-3005: List category posts <= 0.94.0 – Authenticated (Author+) Stored Cross-Site Scripting via 'catlist' Shortcode (list-category-posts)
The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.94.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
