
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-02-10
CVE-2026-25423: Real 3D FlipBook <= 4.19.1 – Missing Authorization (real3d-flipbook-lite)
The Real 3D FlipBook plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 4.19.1. This makes it possible for authenticated attackers, with author-level access and above, to perform an unauthorized action.
2026-02-10
CVE-2025-13391: Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) <= 4.9.60 – Missing Authorization to Unauthenticated Arbitrary Attachment and Dropbox File Deletion (uni-woo-custom-product-options-premium)
The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'uni_cpo_remove_file' function in all versions up to, and including, 4.9.60. This makes it possible for unauthenticated attackers to delete arbitrary attachments or files stored…
2026-02-10
CVE-2025-14541: Lucky Wheel Giveaway <= 1.0.22 – Authenticated (Administrator+) Remote Code Execution via 'conditional_tags' Parameter (wp-lucky-wheel)
The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above,…
2026-02-10
CVE-2026-0910: wpForo Forum <= 2.4.13 – Authenticated (Subscriber+) PHP Object Injection (wpforo)
The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.13 via deserialization of untrusted input in the 'wpforo_display_array_data' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable…
2026-02-10
CVE-2026-1893: Orbisius Random Name Generator <= 1.0.2 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'btn_label' Shortcode Attribute (orbisius-random-name-generator)
The Orbisius Random Name Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'btn_label' parameter in the 'orbisius_random_name_generator' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts…
2026-02-10
CVE-2026-1231: Beaver Builder Page Builder – Drag and Drop Website Builder <= 2.10.0.5 – Authenticated (Custom+) Missing Authorization to Stored Cross-Site Scripting via Global Settings (beaver-builder-lite-version)
The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `js` Global Settings parameter in all versions up to, and including, 2.10.0.5 due to missing capability checks on save_global_settings() function and insufficient input sanitization and output escaping. This makes it possible for authenticated…
2026-02-10
CVE-2025-13431: SlimStat Analytics <= 5.3.1 – Authenticated (Subscriber+) SQL Injection via `args` Parameter (wp-slimstat)
The SlimStat Analytics plugin for WordPress is vulnerable to time-based SQL Injection via the ‘args’ parameter in all versions up to, and including, 5.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above,…
2026-02-10
CVE-2025-15524: Gallery by FooGallery <= 3.1.9 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Gallery Metadata Exposure (foogallery)
The Gallery by FooGallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax_get_gallery_info() function in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve metadata (name, image count, thumbnail URL) of private, draft,…
2026-02-10
CVE-2026-1357: Migration, Backup, Staging <= 0.9.123 – Unauthenticated Arbitrary File Upload (wpvivid-backuprestore)
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt…
2026-02-10
CVE-2026-1821: Microtango <= 0.9.29 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (microtango)
The Microtango plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'restkey' parameter of the mt_reservation shortcode in all versions up to, and including, 0.9.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
