
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-27
CVE-2025-69305: Crete Core <= 1.4.3 – Unauthenticated SQL Injection (crete-core)
The Crete Core plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can…
2026-01-27
CVE-2025-68531: ModelTheme Addons for WPBakery and Elementor < 1.5.6 – Authenticated (Contributor+) PHP Object Injection (modeltheme-addons-for-wpbakery)
The ModelTheme Addons for WPBakery and Elementor plugin for WordPress is vulnerable to PHP Object Injection in versions up to 1.5.6 via deserialization of untrusted input. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a…
2026-01-27
CVE-2026-1295: Buy Now Plus <= 1.0.2 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes (buy-now-plus)
The Buy Now Plus – Buy Now buttons for Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'buynowplus' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on shortcode attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to…
2026-01-27
CVE-2025-14039: Simple Folio <= 1.1.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'Client name' and 'Link' Meta Fields (simple-folio)
The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_simple_folio_item_client_name' and '_simple_folio_item_link' meta fields in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that…
2026-01-27
CVE-2025-68847: iSape <= 0.72 – Reflected Cross-Site Scripting (isape)
The iSape plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 0.72 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as…
2026-01-27
CVE-2025-68856: Mopinion Feedback Form <= 1.1.1 – Reflected Cross-Site Scripting (mopinion-feedback-form)
The Mopinion Feedback Form plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action…
2026-01-27
CVE-2025-68843: FeedWordPress Advanced Filters <= 0.6.2 – Reflected Cross-Site Scripting (faf)
The FeedWordPress Advanced Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 0.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action…
2026-01-27
CVE-2025-68855: JobBoard Job listing <= 1.2.8 – Unauthenticated Information Exposure (job-board-light)
The JobBoard Job listing plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.8. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data.
2026-01-27
CVE-2026-1060: WP Adminify <= 4.0.7.7 – Unauthenticated Sensitive Information Exposure via 'get-addons-list' REST API (adminify)
The WP Adminify plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.7.7 via the /wp-json/adminify/v1/get-addons-list REST API endpoint. The endpoint is registered with permission_callback set to __return_true, allowing unauthenticated attackers to retrieve the complete list of available addons, their installation status, version numbers, and download URLs.
2026-01-27
CVE-2025-67977: HAPPY <= 1.0.8 – Missing Authorization (happy-helpdesk-support-ticket-system)
The HAPPY – Helpdesk Support Ticket System plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.0.8. This makes it possible for unauthenticated attackers to perform an unauthorized action.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
