
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-02-17
CVE-2026-1943: YayMail <= 4.3.2 – Authenticated (Shop Manager+) Stored Cross-Site Scripting via Template Elements (yaymail)
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will…
2026-02-17
CVE-2026-2281: Private Comment <= 0.0.4 – Authenticated (Administrator+) Stored Cross-Site Scripting via Label Text Setting (private-comment)
The Private Comment plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Label text' setting in all versions up to, and including, 0.0.4. This is due to insufficient input sanitization and output escaping on the plugin's label text option. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject…
2026-02-17
CVE-2026-1807: InteractiveCalculator for WordPress <= 1.0.3 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'id' Shortcode Attribute (interactivecalculator)
The InteractiveCalculator for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'interactivecalculator' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts…
2026-02-17
CVE-2026-2296: Product Addons for Woocommerce – Product Options with Custom Fields <= 3.1.0 – Authenticated (Shop Manager+) Code Injection via Conditional Logic 'operator' Parameter (woo-custom-product-addons)
The Product Addons for Woocommerce – Product Options with Custom Fields plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 3.1.0. This is due to insufficient input validation of the 'operator' field in conditional logic rules within the evalConditions() function, which passes unsanitized user input directly to PHP's eval()…
2026-02-17
CVE-2026-1937: YayMail <= 4.3.2 – Missing Authorization to Authenticated (Shop Manager+) Arbitrary Options Update via 'yaymail_import_state' AJAX Action (yaymail)
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to…
2026-02-17
CVE-2026-1831: YayMail <= 4.3.2 – Missing Authorization to Authenticated (Shop Manager+) Plugin Installation and Activation (yaymail)
The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and…
2026-02-17
CVE-2026-1938: YayMail <= 4.3.2 – Missing Authorization to Authenticated (Shop Manager+) License Key Deletion via '/yaymail-license/v1/license/delete' Endpoint (yaymail)
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized license key deletion due to a missing authorization check on the `/yaymail-license/v1/license/delete` REST endpoint in versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to delete the plugin's license key via the…
2026-02-17
CVE-2026-1860: Kali Forms <= 2.4.8 – Insecure Direct Object Reference to Authenticated (Contributor+) Sensitive Form Data Exposure (kali-forms)
The Kali Forms plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.4.8. This is due to the `get_items_permissions_check()` permission callback on the `/kaliforms/v1/forms/{id}` REST API endpoint only checking for the `edit_posts` capability without verifying that the requesting user has ownership or authorization over the specific form…
2026-02-17
CVE-2026-1941: WP Event Aggregator <= 1.8.7 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (wp-event-aggregator)
The WP Event Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_events' shortcode in all versions up to, and including, 1.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts…
2026-02-17
CVE-2026-1656: Business Directory Plugin <= 6.4.20 – Missing Authorization to Unauthenticated Arbitrary Listing Modification (business-directory-plugin)
The Business Directory Plugin for WordPress is vulnerable to authorization bypass due to a missing authorization check in all versions up to, and including, 6.4.20. This makes it possible for unauthenticated attackers to modify arbitrary listings, including changing titles, content, and email addresses, by directly referencing the listing ID in crafted requests to the wpbdp_ajax…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
