
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-04-09
CVE-2026-6443: Essentialplugin Plugins (Various Versions) – Injected Backdoor (post-grid-and-filter-ultimate)
All plugins by Essentialplugin for WordPress are vulnerable to an injected backdoor in various versions. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This makes it possible for the threat actor to maintain a persistent backdoor and inject spam…
2026-04-08
CVE-2026-5711: Post Blocks & Tools <= 1.3.0 – Authenticated (Author+) Stored Cross-Site Scripting via 'sliderStyle' Block Attribute (bnm-blocks)
The Post Blocks & Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sliderStyle' block attribute in the Posts Slider block in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and…
2026-04-08
CVE-2026-4336: Ultimate FAQ Accordion Plugin <= 2.4.7 – Authenticated (Author+) Stored Cross-Site Scripting via FAQ Content (ultimate-faqs)
The Ultimate FAQ Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via FAQ content in all versions up to, and including, 2.4.7. This is due to the plugin calling html_entity_decode() on post_content during rendering in the set_display_variables() function (View.FAQ.class.php, line 746), which converts HTML entity-encoded payloads back into executable HTML, combined with insufficient…
2026-04-08
CVE-2026-5357: Download Manager <= 3.3.52 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (download-manager)
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sid' parameter of the 'wpdm_members' shortcode in versions up to and including 3.3.52. This is due to insufficient input sanitization and output escaping on the user-supplied 'sid' shortcode attribute. The sid parameter is extracted without sanitization in the members() function and…
2026-04-08
CVE-2026-1830: Quick Playground <= 1.3.1 – Missing Authorization to Unauthenticated Arbitrary File Upload (quick-playground)
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP…
2026-04-08
CVE-2026-5436: MW WP Form <= 5.1.1 – Unauthenticated Arbitrary File Move via regenerate_upload_file_keys (mw-wp-form)
The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() function, which uses WordPress's path_join() — a function that returns absolute paths unchanged, discarding the intended base…
2026-04-08
CVE-2026-5742: UsersWP <= 1.2.60 – Authenticated (Subscriber+) Stored Cross-Site Scripting via User Badge Link Substitution (userswp)
The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.2.60. This is due to insufficient input sanitization of user-supplied URL fields and improper output escaping when rendering user profile data in badge widgets. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject…
2026-04-08
CVE-2026-39519: GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero-Prompt Content <= 1.2.0 – Unauthenticated SQL Injection (geeky-bot)
The GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero-Prompt Content plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append…
2026-04-08
CVE-2026-39591: WP-BusinessDirectory – Business directory plugin for WordPress <= 4.0.0 – Authenticated (Subscriber+) Arbitrary File Upload (wp-businessdirectory)
The WP-BusinessDirectory – Business directory plugin for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 4.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make…
2026-04-08
CVE-2026-39587: WP BASE Booking of Appointments, Services and Events <= 5.9.0 – Unauthenticated Privilege Escalation (wp-base-booking-of-appointments-services-and-events)
The WP BASE Booking of Appointments, Services and Events plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 5.9.0. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
