
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-02-24
CVE-2026-27379: NextScripts: Social Networks Auto-Poster <= 4.4.7 – Authenticated (Contributor+) PHP Object Injection (social-networks-auto-poster-facebook-twitter-g)
The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.4.7 via deserialization of untrusted input. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a…
2026-02-24
CVE-2026-2479: Responsive Lightbox & Gallery <= 2.7.1 – Authenticated (Author+) Server-Side Request Forgery via Remote Library Image Upload (responsive-lightbox)
The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.1. This is due to the use of `strpos()` for substring-based hostname validation instead of strict host comparison in the `ajax_upload_image()` function. This makes it possible for authenticated attackers, with Author-level access and above,…
2026-02-24
CVE-2026-1916: WPGSI: Spreadsheet Integration <= 3.8.3 – Missing Authorization to Unauthenticated Arbitrary Post Creation and Deletion via Forged Base64 Token (wpgsi)
The WPGSI: Spreadsheet Integration plugin for WordPress is vulnerable to unauthorized modification and loss of data due to missing capability checks and an insecure authentication mechanism on the `wpgsi_callBackFuncAccept` and `wpgsi_callBackFuncUpdate` REST API functions in all versions up to, and including, 3.8.3. Both REST endpoints use `permission_callback => '__return_true'`, allowing unauthenticated access. The plugin's custom…
2026-02-24
CVE-2026-1614: Rise Blocks – A Complete Gutenberg Page Builder <= 3.7 – Authenticated (Contributor+) Stored Cross-Site Scripting via Site Identity Block Attributes (rise-blocks)
The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘logoTag’ Site Identity block attribute in all versions up to, and including, 3.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject…
2026-02-24
CVE-2026-2416: Geo Mashup <= 1.13.17 – Unauthenticated SQL Injection via 'sort' Parameter (geo-mashup)
The Geo Mashup plugin for WordPress is vulnerable to SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.17. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL…
2026-02-24
CVE-2026-1929: Advanced Woo Labels <= 2.37 – Authenticated (Contributor+) Remote Code Execution via 'callback' Parameter (advanced-woo-labels)
The Advanced Woo Labels plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.37. This is due to the use of `call_user_func_array()` with user-controlled callback and parameters in the `get_select_option_values()` AJAX handler without an allowlist of permitted callbacks or a capability check. This makes it possible for authenticated…
2026-02-24
CVE-2026-2367: Secure Copy Content Protection and Content Locking <= 5.0.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attribute (secure-copy-content-protection)
The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ays_block' shortcode in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to…
2026-02-24
CVE-2025-14742: WP Recipe Maker <= 10.2.3 – Missing Authorization to Authenticated (Subscriber+) Sensitive Information Exposure (wp-recipe-maker)
The WP Recipe Maker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ajax_search_recipes' and 'ajax_get_recipe' functions in all versions up to, and including, 10.2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive recipe information including draft, pending, and…
2026-02-24
CVE-2026-2301: Post Duplicator <= 3.0.8 – Missing Authorization to Authenticated (Contributor+) Protected Post Meta Insertion via 'customMetaData' Parameter (post-duplicator)
The Post Duplicator plugin for WordPress is vulnerable to unauthorized arbitrary protected post meta insertion in all versions up to, and including, 3.0.8. This is due to the `duplicate_post()` function in `includes/api.php` using `$wpdb->insert()` directly to the `wp_postmeta` table instead of WordPress's standard `add_post_meta()` function, which would call `is_protected_meta()` to prevent lower-privileged users from setting…
2026-02-24
CVE-2026-2410: Disable Admin Notices – Hide Dashboard Notifications <= 1.4.2 – Cross-Site Request Forgery to Plugin Settings Update (disable-admin-notices)
The Disable Admin Notices – Hide Dashboard Notifications plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.2. This is due to missing nonce validation in the `showPageContent()` function. This makes it possible for unauthenticated attackers to add arbitrary URLs to the blocked redirects list via a forged…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
