Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-02-10

CVE-2026-0815: Category Image <= 2.0 – Authenticated (Editor+) Stored Cross-Site Scripting via 'tag-image' Parameter (category-image)

The Category Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag-image' parameter in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Editor-level access and above, to inject arbitrary web scripts in pages that will execute whenever…
2026-02-10

CVE-2026-1786: Twitter posts to Blog <= 1.11.25 – Missing Authorization to Unauthenticated Plugin Settings Update (twitter-posts-to-blog)

The Twitter posts to Blog plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'dg_tw_options' function in all versions up to, and including, 1.11.25. This makes it possible for unauthenticated attackers to update plugin settings including Twitter API credentials, post author, post status, and the capability…
2026-02-10

CVE-2026-1833: WaMate Confirm <= 2.0.1 – Missing Authorization to Authenticated (Subscriber+) Arbitrary Phone Number Blocking/Unblocking (wamate-confirm)

The WaMate Confirm – Order Confirmation plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 2.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to block and…
2026-02-10

CVE-2026-1826: OpenPOS Lite <= 3.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (wpos-lite-version)

The OpenPOS Lite – Point of Sale for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width' parameter of the order_qrcode shortcode in all versions up to, and including, 3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to…
2026-02-10

CVE-2026-1809: HTML Shortcodes <= 1.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (html-shortcodes)

The HTML Tag Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in…
2026-02-10

CVE-2026-1885: Slideshow Wp <= 1.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'sswp-slide' Shortcode 'sswpid' Attribute (slideshow-wp)

The Slideshow Wp plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sswpid' attribute of the 'sswp-slide' shortcode in all versions up to, and including, 1.1. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to…
2026-02-10

CVE-2025-15440: iONE360 configurator <= 2.0.57 – Unauthenticated Stored Cross-Site Scripting via Contact Form Parameters (ione360-configurator)

The iONE360 configurator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Contact Form Parameters in all versions up to, and including, 2.0.57 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an…
2026-02-10

CVE-2026-0724: WPlyr Media Block <= 1.3.0 – Authenticated (Administrator+) Stored Cross-Site Scripting via '_wplyr_accent_color' Parameter (wplyr-media-block)

The WPlyr Media Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_wplyr_accent_color' parameter in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in…
2026-02-10

CVE-2026-1215: MMA Call Tracking <= 2.3.15 – Cross-Site Request Forgery to Plugin Settings Update (mma-call-tracking)

The MMA Call Tracking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.15. This is due to missing nonce validation when saving plugin configuration on the `mma_call_tracking_menu` admin page. This makes it possible for unauthenticated attackers to modify call tracking configuration settings via a forged request granted…
2026-02-10

CVE-2026-1827: IDE Micro code-editor <= 1.0.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'title' Shortcode Attribute (flask-micro)

The Flask Micro code-editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's codeflask shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works