Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-02-17

CVE-2026-1714: ShopLentor <= 3.3.2 – Unauthenticated Email Relay Abuse via 'woolentor_suggest_price_action' AJAX Action (woolentor-addons)

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. This…
2026-02-17

CVE-2025-13959: Filestack <= 2.0.8 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (filepicker-media-uploader)

The Filestack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'filepicker' shortcode in all versions up to, and including, 2.0.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages…
2026-02-17

CVE-2026-1296: Frontend Post Submission Manager Lite <= 1.2.7 – Unauthenticated Open Redirect via 'requested_page' Parameter (frontend-post-submission-manager-lite)

The Frontend Post Submission Manager Lite plugin for WordPress is vulnerable to Open Redirection in all versions up to, and including, 1.2.7 due to insufficient validation on the 'requested_page' POST parameter in the verify_username_password function. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them…
2026-02-17

CVE-2025-12037: WP 404 Auto Redirect <= 1.0.5 – Authenticated (Admin+) Stored Cross-Site Scripting (wp-404-auto-redirect-to-similar-post)

The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages…
2026-02-17

CVE-2026-1925: EmailKit – Email Customizer for WooCommerce & WP <= 1.6.2 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Post Title Modification (emailkit)

The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the 'update_template_data' function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title of any post…
2026-02-17

CVE-2025-12075: Order Splitter for WooCommerce <= 5.3.5 – Missing Authorization to Authenticated (Subscriber+) Order Information Exposure (woo-order-splitter)

The Order Splitter for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wos_troubleshooting' AJAX endpoint in all versions up to, and including, 5.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view information pertaining to other user's orders.
2026-02-17

CVE-2026-1304: Membership Plugin – Restrict Content <= 3.2.18 – Authenticated (Administrator+) Stored Cross-Site Scripting via Invoice Settings (restrict-content)

The Membership Plugin – Restrict Content for WordPress is vulnerable to Stored Cross-Site Scripting via multiple invoice settings fields in all versions up to, and including, 3.2.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that…
2026-02-17

CVE-2025-12122: Popup Box – Easily Create WordPress Popups <= 3.2.12 – Authenticated (Contributor+) Stored Cross-Site Scripting (popup-box)

The Popup Box – Easily Create WordPress Popups plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframeBox' shortcode in all versions up to, and including, 3.2.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to…
2026-02-17

CVE-2025-12356: Tickera – WordPress Event Ticketing <= 3.5.6.4 – Missing Authorization to Authenticated (Subscriber+) Event/Post Status Update (tickera-event-ticketing-system)

The Tickera – Sell Tickets & Manage Events plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_change_ticket_status' AJAX endpoint in all versions up to, and including, 3.5.6.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update post/event statuses.
2026-02-17

CVE-2025-12071: Frontend User Notes <= 2.1.0 – Insecure Direct Object Reference to Authenticated (Subscriber+) Arbitrary Note Modification (frontend-user-notes)

The Frontend User Notes plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.0 via the 'funp_ajax_modify_notes' AJAX endpoint due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify arbitrary notes that do not…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works