Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-01-07

CVE-2026-22486: Re Gallery – Responsive Photo Gallery <= 1.17.19 – Missing Authorization (regallery)

The Re Gallery – Responsive Photo Gallery plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 1.17.19. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-07

CVE-2026-22492: Docket Cache <= 24.07.04 – Missing Authorization (docket-cache)

The Docket Cache – Object Cache Accelerator plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 24.07.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.
2026-01-07

CVE-2026-23805: Media Search Enhanced <= 0.9.1 – Authenticated (Author+) SQL Injection (media-search-enhanced)

The Media Search Enhanced plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 0.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with author-level access and above, to append additional SQL queries…
2026-01-07

CVE-2026-27092: WPAdverts – Classifieds Plugin <= 2.2.11 – Missing Authorization (wpadverts)

The WPAdverts – Classifieds Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 2.2.11. This makes it possible for authenticated attackers, with contributor-level access and above, to perform an unauthorized action.
2026-01-07

CVE-2026-22517: GA4WP: Google Analytics for WordPress <= 2.10.0 – Missing Authorization (ga-for-wp)

The GA4WP: Google Analytics for WordPress plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 2.10.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized action.
2026-01-07

CVE-2025-14358: REHub Framework <= 19.9.5 – Missing Authorization (rehub-framework)

The REHub Framework plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 19.9.5. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-07

CVE-2025-47500: Stackable <= 3.19.5 – Authenticated (Author+) Stored Cross-Site Scripting (stackable-ultimate-gutenberg-blocks)

The Stackable plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 3.19.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
2026-01-07

CVE-2025-69351: Ninja Tables <= 5.2.4 – Authenticated (Contributor+) SQL Injection (ninja-tables)

The Ninja Tables plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 5.2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into…
2026-01-07

CVE-2025-14984: Gutenverse Form <= 2.3.2 – Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload (gutenverse-form)

The Gutenverse Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file upload in all versions up to, and including, 2.3.2. This is due to the plugin's framework component adding SVG to the allowed MIME types via the upload_mimes filter without implementing any sanitization of SVG file contents. This makes it possible…
2026-01-07

CVE-2025-14275: Jeg Elementor Kit <= 3.0.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via Countdown Widget (jeg-elementor-kit)

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.0.1 due to insufficient input sanitization in the countdown widget's redirect functionality. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary JavaScript that will execute when an administrator or…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works