Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-01-27

CVE-2025-14610: TableMaster for Elementor <= 1.3.6 – Authenticated (Author+) Server-Side Request Forgery via 'csv_url' Parameter (tablemaster-for-elementor)

The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level…
2026-01-27

CVE-2026-1298: Easy Replace Image <= 3.5.2 – Missing Authorization to Authenticated (Contributor+) Arbitrary Attachment Replacement (easy-replace-image)

The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.5.2. This is due to missing capability checks on the `image_replacement_from_url` function that is hooked to the `eri_from_url` AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to replace arbitrary image…
2026-01-27

CVE-2025-8072: Target Video Easy Publish <= 3.8.8 – Authenticated (Contributor+) Stored Cross-Site Scripting via placeholder_img Parameter (brid-video-easy-publish)

The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder_img’ parameter in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will…
2026-01-27

CVE-2026-1244: Forms Bridge <= 4.2.5 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'id' Shortcode Attribute (forms-bridge)

The Forms Bridge – Infinite integrations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute in the 'financoop_campaign' shortcode in all versions up to, and including, 4.2.5. This is due to insufficient input sanitization and output escaping on the user-supplied 'id' parameter in the forms_bridge_financoop_shortcode_error function. This makes it possible…
2026-01-27

CVE-2026-0832: New User Approve <= 3.2.2 – Missing Authorization to Unauthenticated Arbitrary User Approval, Denial, and Information Disclosure (new-user-approve)

The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to approve or deny user accounts, retrieve sensitive user information including…
2026-01-27

CVE-2026-1083: Appointment Hour Booking – Booking Calendar <= 1.5.60 – Authenticated (Administrator+) Stored Cross-Site Scripting via 'Min/Max Length' Field Configuration (appointment-hour-booking)

The Appointment Hour Booking – Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form field configuration parameters in all versions up to, and including, 1.5.60 due to insufficient input sanitization and output escaping on the 'Min length/characters' and 'Max length/characters' field configuration values. This makes it possible for authenticated attackers, with…
2026-01-27

CVE-2025-9082: WPBITS Addons For Elementor <= 1.8 – Authenticated (Contributor+) Stored Cross-Site Scripting (wpbits-addons-for-elementor)

The WPBITS Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widget parameters in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping when dynamic content is enabled. This makes it possible for authenticated attackers with contributor-level permissions and above to inject arbitrary web scripts…
2026-01-27

CVE-2026-1400: AI Engine <= 3.3.2 – Authenticated (Editor+) Arbitrary File Upload via 'filename' Parameter in update_media_metadata Endpoint (ai-engine)

The AI Engine – The Chatbot and AI Framework for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the `rest_helpers_update_media_metadata` function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on…
2026-01-27

CVE-2026-0825: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.5 – Missing Authorization to Unauthenticated Form Data Exfiltration via CSV Export (contact-form-entries)

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing…
2026-01-27

CVE-2025-12709: Interactions – Create Interactive Experiences in the Block Editor <= 1.3.1 – Authenticated (Contributor+) Stored Cross-Site Scripting (interactions)

The Interactions – Create Interactive Experiences in the Block Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event selectors in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts…

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works