
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-03-10
CVE-2026-1708: Appointment Booking Calendar <= 1.6.9.27 – Unauthenticated SQL Injection via 'append_where_sql' Parameter (simply-schedule-appointments)
The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for…
2026-03-09
CVE-2026-22520: Handmade Framework <= 3.9 – Reflected Cross-Site Scripting (handmade-framework)
The Handmade Framework plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such…
2026-03-09
CVE-2026-3585: The Events Calendar <= 6.15.17 – Authenticated (Author+) Arbitrary File Read via ajax_create_import (the-events-calendar)
The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
2026-03-09
CVE-2026-1920: Booktics <= 1.0.16 – Missing Authorization to Addon Plugin Installation (booktics)
The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'Extension_Controller::update_item_permissions_check' function in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to install addon plugins.
2026-03-09
CVE-2026-1919: Booktics <= 1.0.16 – Missing Authorization to Get Items via REST API endpoints (booktics)
The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to query sensitive data.
2026-03-09
CVE-2026-0953: Tutor LMS Pro <= 3.9.5 – Authentication Bypass via Social Login (tutor-pro)
The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for…
2026-03-09
CVE-2026-3228: NextScripts: Social Networks Auto-Poster <= 4.4.6 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'nxs_fbembed' Shortcode (social-networks-auto-poster-facebook-twitter-g)
The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[nxs_fbembed]` shortcode in all versions up to, and including, 4.4.6. This is due to insufficient input sanitization and output escaping on the `snapFB` post meta value. This makes it possible for authenticated attackers, with Contributor-level access and above, to…
2026-03-09
CVE-2026-1261: MetForm Pro <= 3.9.6 – Unauthenticated Stored Cross-Site Scripting (metform-pro)
The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected…
2026-03-09
CVE-2026-2724: Unlimited Elements For Elementor <= 2.0.5 – Unauthenticated Stored Cross-Site Scripting via Form Entry Fields (unlimited-elements-for-elementor)
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form entry fields in all versions up to, and including, 2.0.5. This is due to insufficient input sanitization and output escaping on form submission data displayed in the admin Form Entries Trash view. This makes it possible for unauthenticated…
2026-03-06
CVE-2026-3352: Easy PHP Settings <= 1.0.4 – Authenticated (Administrator+) PHP Code Injection via 'wp_memory_limit' Setting (easy-php-settings)
The Easy PHP Settings plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0.4 via the `update_wp_memory_constants()` method. This is due to insufficient input validation on the `wp_memory_limit` and `wp_max_memory_limit` settings before writing them to `wp-config.php`. The `sanitize_text_field()` function used for sanitization does not filter single quotes, allowing…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
