Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2025-12-31

CVE-2025-62126: Varnish/Nginx Proxy Caching <= 1.8.3 – Unauthenticated Information Exposure (vcaching)

The Varnish/Nginx Proxy Caching plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.3. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data.
2025-12-31

CVE-2025-66151: Countdowner for Elementor <= 1.0.4 – Missing Authorization (countdowner-elementor)

The Countdowner for Elementor plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized action.
2025-12-31

CVE-2025-62874: AnyComment <= 0.3.6 – Missing Authorization (anycomment)

The AnyComment plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 0.3.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized action.
2025-12-31

CVE-2025-62888: Attachments <= 5.2 – Missing Authorization (wp-attachments)

The Attachments plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 5.2. This makes it possible for authenticated attackers, with contributor-level access and above, to perform an unauthorized action.
2025-12-31

CVE-2025-62748: Web and WooCommerce Addons for WPBakery Builder <= 1.5 – Authenticated (Contributor+) Stored Cross-Site Scripting (vc-addons-by-bit14)

The Web and WooCommerce Addons for WPBakery Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever…
2025-12-31

CVE-2025-62117: EasyIndex <= 1.1.1704 – Cross-Site Request Forgery (easyindex)

The EasyIndex plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.1704. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized action via a forged request granted they can trick a site administrator into performing…
2025-12-03

CVE-2025-12826: Custom Post Type UI <= 1.18.0 – Missing Authorization to Unauthenticated (Previously Administrator+) Custom Post Type Modification (custom-post-type-ui)

The Custom Post Type UI plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.18.0. This is due to the plugin not verifying that a user has the required capability to perform actions in the "cptui_process_post_type" function. This makes it possible for authenticated attackers, with subscriber level access and…
2025-10-02

CVE-2025-6388: Spirit Framework <= 1.2.14 – Authentication Bypass to Account Takeover and Privilege Escalation (spirit-framework)

The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted…
2025-09-18

CVE-2025-5955: Service Finder SMS System <= 2.0.0 – Authentication Bypass (aone-sms)

The Service Finder SMS System plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.0. This is due to the plugin not verifying a user's phone number before logging them in. This makes it possible for unauthenticated attackers to login as arbitrary users.
2025-08-07

CVE-2025-54693: Form Block <= 1.5.5 – Unauthenticated Arbitrary File Upload (form-block)

The Form Block plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the files() function in all versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works