
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-06
CVE-2025-13722: Fluent Forms <= 6.1.7 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Form Creation via AI Builder (fluentform)
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.1.7. This is due to missing capability checks on the `fluentform_ai_create_form` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create…
2026-01-06
CVE-2025-14352: Awesome Hotel Booking <= 1.0.3 – Incorrect Authorization to Unauthenticated Arbitrary Booking Modification (awesome-hotel-booking)
The Awesome Hotel Booking plugin for WordPress is vulnerable to unauthorized modification of data due to incorrect authorization in the room-single.php shortcode handler in all versions up to, and including, 1.0.3. This is due to the plugin relying solely on nonce verification without capability checks. This makes it possible for unauthenticated attackers to modify arbitrary…
2026-01-06
CVE-2025-14109: AH Shortcodes <= 1.0.2 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'column' Shortcode Attribute (ah-shortcodes)
The AH Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'column' shortcode attribute in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute…
2026-01-06
CVE-2025-14053: Travel Bucket List <= 0.5.2 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (wish-to-go)
The Wish To Go plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcode attributes in all versions up to, and including, 0.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages…
2026-01-06
CVE-2025-14077: Simcast <= 1.0.0 – Cross-Site Request Forgery to Settings Update (simcast)
The Simcast plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the settingsPage function. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into…
2026-01-05
CVE-2025-63019: Cookies and Content Security Policy <= 2.34 – Unauthenticated Information Exposure (cookies-and-content-security-policy)
The Cookies and Content Security Policy plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.34. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data.
2026-01-05
CVE-2025-67928: Automotive Listings <= 18.6 – Unauthenticated SQL Injection (automotive)
The Automotive Listings plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 18.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can…
2026-01-05
CVE-2026-22468: Absolute Addons For Elementor <= 1.0.14 – Missing Authorization (absolute-addons)
The Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 1.0.14. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized action.
2026-01-05
CVE-2025-69091: Demo Importer Plus <= 2.0.8 – Missing Authorization (demo-importer-plus)
The Demo Importer Plus plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 2.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.
2026-01-05
CVE-2025-67915: Timetics <= 1.0.46 – Incorrect Authorization to Authenticated (Timetics Customer+) User Creation (timetics)
The Appointment Booking Calendar – WP Timetics Booking Plugin plugin for WordPress is vulnerable to unauthorized access due to a insufficient capability check in the api-customer.php file in all versions up to, and including, 1.0.46. This makes it possible for authenticated attackers, with Timetics Customer-level access and above, to create arbitrary user accounts.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
