Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-02-13

CVE-2025-13973: StickEasy Protected Contact Form <= 1.0.1 – Unauthenticated Information Disclosure (stickeasy-protected-contact-form)

The StickEasy Protected Contact Form plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.0.2. The plugin stores spam detection logs at a predictable publicly accessible location (wp-content/uploads/stickeasy-protected-contact-form/spcf-log.txt). This makes it possible for unauthenticated attackers to download the log file and access sensitive information including visitor IP addresses,…
2026-02-13

CVE-2026-0692: BlueSnap Payment Gateway for WooCommerce <= 3.4.0 – Missing Authorization to Unauthenticated Arbitrary Order Status Manipulation (bluesnap-payment-gateway-for-woocommerce)

The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.4.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible…
2026-02-13

CVE-2026-1983: SEATT: Simple Event Attendance <= 1.5.0 – Cross-Site Request Forgery to Arbitrary Event Deletion (simple-event-attendance)

The SEATT: Simple Event Attendance plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.0. This is due to missing nonce validation on the event deletion functionality. This makes it possible for unauthenticated attackers to delete arbitrary events via a forged request granted they can trick an administrator…
2026-02-13

CVE-2026-2027: AMP Enhancer <= 1.0.49 – Authenticated (Administrator+) Stored Cross-Site Scripting via AMP Custom CSS Setting (amp-enhancer)

The AMP Enhancer – Compatibility Layer for Official AMP Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the AMP Custom CSS setting in all versions up to, and including, 1.0.49 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and…
2026-02-13

CVE-2026-1904: Simple Wp colorfull Accordion <= 1.0 – Authenticated (Contributor+) Cross-Site Scripting via 'title' Shortcode Attribute (simple-wp-colorfull-accordion)

The Simple Wp colorfull Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in the 'accordion' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts…
2026-02-13

CVE-2026-2144: Magic Login Mail or QR Code <= 2.05 – Unauthenticated Privilege Escalation via Insecure QR Code File Storage (magic-login-mail)

The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.05. This is due to the plugin storing the magic login QR code image with a predictable, static filename (QR_Code.png) in the publicly accessible WordPress uploads directory during the email sending process. The…
2026-02-13

CVE-2026-1915: Simple Plyr <= 0.0.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'poster' Shortcode Attribute (simple-plyr)

The Simple Plyr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'poster' parameter in the 'plyr' shortcode in all versions up to, and including, 0.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary…
2026-02-13

CVE-2026-1754: personal-authors-category <= 0.3 – Reflected Cross-Site Scripting (personal-authors-category)

The personal-authors-category plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the URL path in all versions up to, and including, 0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into…
2026-02-13

CVE-2026-2024: PhotoStack Gallery <= 0.4.1 – Unauthenticated SQL Injection via 'postid' Parameter (photostack-gallery)

The PhotoStack Gallery plugin for WordPress is vulnerable to SQL Injection via the 'postid' parameter in all versions up to, and including, 0.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into…
2026-02-13

CVE-2026-1932: Appointment Booking Calendar Plugin <= 1.0.2 – Missing Authorization to Unauthenticated Arbitrary Appointment Status Modification (bookr)

The Appointment Booking Calendar Plugin – Bookr plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update-appointment REST API endpoint in all versions up to, and including, 1.0.2. This makes it possible for unauthenticated attackers to modify the status of any appointment.

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works