
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-06
CVE-2025-15018: Optional Email <= 1.3.11 – Unauthenticated Privilege Escalation to Account Takeover (optional-email)
The Optional Email plugin for WordPress is vulnerable to Privilege Escalation via Account Takeover in all versions up to, and including, 1.3.11. This is due to the plugin not restricting its 'random_password' filter to registration contexts, allowing the filter to affect password reset key generation. This makes it possible for unauthenticated attackers to set a…
2026-01-06
CVE-2025-13529: Unify <= 3.4.9 – Missing Authorization to Unauthenticated Option Deletion via 'unify_plugin_downgrade' Parameter (unify)
The Unify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'init' action in all versions up to, and including, 3.4.9. This makes it possible for unauthenticated attackers to delete specific plugin options via the 'unify_plugin_downgrade' parameter.
2026-01-06
CVE-2025-12540: ShareThis Dashboard for Google Analytics <= 3.2.4 – Unauthenticated Google Analytics Data Exposure (googleanalytics)
The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.4. This is due to the Google Analytics client_ID and client_secret being stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to craft a link to the sharethis.com…
2026-01-06
CVE-2025-13531: Stylish Order Form Builder <= 1.0 – Authenticated (Subscriber+) Stored Cross-Site Scripting via 'product_name' Parameter (stylish-order-form-builder)
The Stylish Order Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'product_name' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will…
2026-01-06
CVE-2025-14999: Latest Tabs <= 1.5 – Cross-Site Request Forgery to Plugin's Settings Update (kento-latest-tabs)
The Latest Tabs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the settings update handler in admin-page.php. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick…
2026-01-06
CVE-2025-13667: WP Recipe Manager <= 1.0.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'Skill Level' Input Field (wp-recipe-manager)
The WP Recipe Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Skill Level' input field in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts…
2026-01-06
CVE-2025-13847: PhotoFade <= 0.2.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (photofade)
The PhotoFade plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'time' parameter in all versions up to, and including, 0.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a…
2026-01-06
CVE-2025-14110: WP Js List Pages Shortcodes <= 1.21 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'class' Shortcode Attribute (wp-js-list-pages-shortcodes)
The WP Js List Pages Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' shortcode attribute in all versions up to, and including, 1.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages…
2026-01-06
CVE-2025-13990: Mamurjor Employee Info <= 1.0.0 – Cross-Site Request Forgery to Arbitrary Employee and Related Data Manipulation (mamurjor-employee-info)
The Mamurjor Employee Info plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing nonce validation on multiple administrative functions. This makes it possible for unauthenticated attackers to create, update, or delete employee records, departments, designations, salary grades, education records, and salary payments…
2026-01-06
CVE-2025-14114: 1180px Shortcodes <= 1.1.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'class' Shortcode Attribute (1180px-shortcodes)
The 1180px Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' shortcode attribute in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
