Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-02-03

CVE-2026-1755: Menu Icons by ThemeIsle <= 0.13.20 – Authenticated (Author+) Stored Cross-Site Scripting (menu-icons)

The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_wp_attachment_image_alt’ post meta in all versions up to, and including, 0.13.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that…
2026-02-03

CVE-2026-1370: SIBS – WooCommerce <= 2.2.0 – Authenticated (Admin+) SQL Injection via 'referencedId' Parameter (sibs-woocommerce)

The SIBS woocommerce payment gateway plugin for WordPress is vulnerable to time-based SQL Injection via the ‘referencedId’ parameter in all versions up to, and including, 2.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access…
2026-02-03

CVE-2025-14461: Xendit Payment <= 6.0.2 – Missing Authorization to Unauthenticated Arbitrary Order Status Update to Paid (woo-xendit-virtual-accounts)

The Xendit Payment plugin for WordPress is vulnerable to unauthorized order status manipulation in all versions up to, and including, 6.0.2. This is due to the plugin exposing a publicly accessible WooCommerce API callback endpoint (`wc_xendit_callback`) that processes payment callbacks without any authentication or cryptographic verification that the requests originate from Xendit's payment gateway. This…
2026-02-03

CVE-2025-15507: Magic Import Document Extractor <= 1.0.5 – Missing Authorization to Unauthenticated Plugin License Status Modification (magic-import-document-extractor)

The Magic Import Document Extractor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_sync_usage() function in all versions up to, and including, 1.0.5. This makes it possible for unauthenticated attackers to modify the plugin's license status and credit balance.
2026-02-03

CVE-2025-15508: Magic Import Document Extractor <= 1.0.6 – Unauthenticated Sensitive Information Exposure (magic-import-document-extractor)

The Magic Import Document Extractor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.4 via the get_frontend_settings() function. This makes it possible for unauthenticated attackers to extract the site's magicimport.ai license key from the page source on any page containing the plugin's shortcode.
2026-02-03

CVE-2026-0743: WP Content Permission <= 1.2 – Authenticated (Administrator+) Stored Cross-Site Scripting via 'ohmem-message' Parameter (wp-content-permission)

The WP Content Permission plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ohmem-message' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute…
2026-02-03

CVE-2026-0572: WebPurify Profanity Filter <= 4.0.2 – Missing Authorization to Unauthenticated Plugin Settings Change via webpurify_save_options (webpurifytextreplace)

The WebPurify Profanity Filter plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'webpurify_save_options' function in all versions up to, and including, 4.0.2. This makes it possible for unauthenticated attackers to change plugin settings.
2026-02-03

CVE-2025-15482: Chapa Payment Gateway Plugin for WooCommerce <= 1.0.3 – Unauthenticated Sensitive Information Exposure (chapa-payment-gateway-for-woocommerce)

The Chapa Payment Gateway Plugin for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.3 via 'chapa_proceed' WooCommerce API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including the merchant's Chapa secret API key.
2026-02-03

CVE-2026-0742: Smart Appointment & Booking <= 1.0.7 – Authenticated (Subscriber+) Stored Cross-Site Scripting via saab_save_form_data AJAX Action (smart-appointment-booking)

The Smart Appointment & Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the saab_save_form_data AJAX action in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web…
2026-02-03

CVE-2025-15368: SportsPress <= 2.7.26 – Authenticated (Contributor+) Local File Inclusion via Shortcode (sportspress)

The SportsPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.7.26 via shortcodes 'template_name' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works