
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-02-18
CVE-2025-12451: Easy SVG Support <= 4.0 – Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload (easy-svg)
The Easy SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute…
2026-02-18
CVE-2025-11725: Aruba HiSpeed Cache <= 3.0.2 – Missing Authorization to Unauthenticated Plugin's Settings Modification (aruba-hispeed-cache)
The Aruba HiSpeed Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the multiple functions in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to modify plugin's configuration settings, enable or disable features, as well as enable/disable WordPress cron jobs…
2026-02-18
CVE-2025-12375: Printful Integration for WooCommerce <= 2.2.11 – Authenticated (Contributor+) Server-Side Request Forgery (printful-shipping-for-woocommerce)
The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level…
2026-02-18
CVE-2025-12882: Clasifico Listing <= 2.0 – Unauthenticated Privilege Escalation (clasifico-listing)
The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_role' parameter. This makes it possible for unauthenticated attackers to gain elevated privileges by registering an…
2026-02-18
CVE-2025-13587: Two Factor (2FA) Authentication via Email <= 1.9.8 – Two-Factor Authentication Bypass via token (two-factor-2fa-via-email)
The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in…
2026-02-18
CVE-2025-12500: Checkout Field Manager (Checkout Manager) for WooCommerce <= 7.8.1 – Unauthenticated Limited File Upload (woocommerce-checkout-manager)
The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to unauthenticated limited file upload in all versions up to, and including, 7.8.1. This is due to the plugin not properly verifying that a user is authorized to perform file upload actions via the "ajax_checkout_attachment_upload" function. This makes it possible for unauthenticated…
2026-02-18
CVE-2025-12884: Advanced Ads – Ad Manager & AdSense <= 2.0.14 – Missing Authorization to Authenticated (Subscriber+) Ad Placements Update (advanced-ads)
The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 2.0.14. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `placement_update_item()` function. This makes it possible for authenticated attackers, with subscriber-level access…
2026-02-18
CVE-2025-12975: CTX Feed – WooCommerce Product Feed Manager <= 6.6.11 – Missing Authorization to Authenticated (Shop Manager+) Arbitrary Plugin Installation (webappick-product-feed-for-woocommerce)
The CTX Feed – WooCommerce Product Feed Manager plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the woo_feed_plugin_installing() function in all versions up to, and including, 6.6.11. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install arbitrary plugins which can…
2026-02-18
CVE-2025-13603: WP AUDIO GALLERY <= 2.0 – Authenticated (Subscriber+) Arbitrary File Read via .htaccess Manipulation (wp-audio-gallery)
The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" function This makes it possible for authenticated attackers, with subscriber-level access and above, to overwrite the site's .htaccess…
2026-02-18
CVE-2025-13617: Apollo13 Framework Extension <= 1.9.8 – Authenticated (Contributor+) Stored Cross-Site Scripting via `a13_alt_link` Parameter (apollo13-framework-extensions)
The Apollo13 Framework Extensions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘a13_alt_link’ parameter in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
