Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-02-02

CVE-2026-25024: ThirstyAffiliates <= 3.11.9 – Cross-Site Request Forgery (thirstyaffiliates)

The ThirstyAffiliates – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.11.9. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized action granted they…
2026-02-02

CVE-2026-1447: Mail Mint <= 1.19.2 – Cross-Site Request Forgery to Stored Cross-Site Scripting (mail-mint)

The Mail Mint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.19.2. This is due to missing nonce validation on the create_or_update_note function. This makes it possible for unauthenticated attackers to create or update contact notes via a forged request granted they can trick a site administrator…
2026-02-02

CVE-2026-1210: Happy Addons for Elementor <= 3.20.7 – Authenticated (Contributor+) Stored Cross-Site Scripting via '_elementor_data' Meta Field (happy-elementor-addons)

The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_elementor_data' meta field in all versions up to, and including, 3.20.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that…
2026-02-02

CVE-2026-1065: Form Maker by 10Web <= 1.15.35 – Unauthenticated Stored Cross-Site Scripting via SVG file (form-maker)

The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.35. This is due to the plugin's default file upload allowlist including SVG files combined with weak substring-based extension validation. This makes it possible for unauthenticated attackers to upload malicious SVG files containing JavaScript…
2026-02-02

CVE-2026-1058: Form Maker by 10Web <= 1.15.35 – Unauthenticated Stored Cross-Site Scripting via Hidden Field (form-maker)

The Form Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via hidden field values in all versions up to, and including, 1.15.35. This is due to insufficient output escaping when displaying hidden field values in the admin submissions list. The plugin uses html_entity_decode() on user-supplied hidden field values without subsequent escaping before output,…
2026-02-02

CVE-2026-1375: Tutor LMS <= 3.9.5 – Insecure Direct Object Reference to Authenticated (Instructor+) Arbitrary Course Modification and Deletion (tutor)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object References (IDOR) in all versions up to, and including, 3.9.5. This is due to missing object-level authorization checks in the `course_list_bulk_action()`, `bulk_delete_course()`, and `update_course_status()` functions. This makes it possible for authenticated attackers, with Tutor Instructor-level access and…
2026-02-02

CVE-2026-1371: Tutor LMS <= 3.9.5 – Authenticated (Subscriber+) Information Disclosure in Coupon Details via 'tutor_coupon_details' AJAX Action (tutor)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.9.5. This is due to missing authorization checks in the `ajax_coupon_details()` function, which only validates nonces but does not verify user capabilities. This makes it possible for authenticated attackers, with…
2026-02-02

CVE-2026-0617: LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.5 – Unauthenticated Stored Cross-Site Scripting (latepoint)

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the customer profile fields in all versions up to, and including, 5.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that…
2026-02-02

CVE-2026-1730: OS DataHub Maps <= 1.8.3 – Authenticated (Author+) Arbitrary File Upload (os-datahub-maps)

The OS DataHub Maps plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'OS_DataHub_Maps_Admin::add_file_and_ext' function in all versions up to, and including, 1.8.3. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make…
2026-02-01

CVE-2026-25022: KiviCare <= 3.6.16 – Authenticated (Receptionist+) SQL Injection (kivicare-clinic-management-system)

The KiviCare plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.6.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with receptionist-level access and above, to append additional SQL queries into already…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works