
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-27
CVE-2026-1398: Change WP URL <= 1.0 – Cross-Site Request Forgery to Settings Update (change-wp-url)
The Change WP URL plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the 'change-wp-url' page. This makes it possible for unauthenticated attackers to change the WP Login URL via a forged request granted they can trick…
2026-01-27
CVE-2026-1377: imwptip <= 1.1 – Cross-Site Request Forgery to Settings Update (imwptip)
The imwptip plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into…
2026-01-27
CVE-2025-14616: Recooty <= 1.0.6 – Cross-Site Request Forgery to Settings Update (recooty)
The Recooty – Job Widget (Old Dashboard) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing nonce validation on the recooty_save_maybe() function. This makes it possible for unauthenticated attackers to update the recooty_key option and inject malicious content into iframe src attributes…
2026-01-27
CVE-2026-0844: Simple User Registration <= 6.7 – Authenticated (Subscriber+) Privilege Escalation via profile_save_field (wp-registration)
The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 6.7 due to insufficient restriction on the 'profile_save_field' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_capabilities' parameter during a profile update.
2026-01-27
CVE-2026-1391: Vzaar Media Management <= 1.2 – Reflected Cross-Site Scripting via $_SERVER['PHP_SELF'] (vzaar-media-management)
The Vzaar Media Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on the $_SERVER['PHP_SELF'] variable. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a…
2026-01-27
CVE-2026-1380: Bitcoin Donate Button <= 1.0 – Cross-Site Request Forgery to Settings Update (bitcoin-donate-button)
The Bitcoin Donate Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the settings page. This makes it possible for unauthenticated attackers to modify the plugin's settings, including donation addresses and display configurations, via a forged…
2026-01-27
CVE-2026-1280: Frontend File Manager Plugin <= 23.5 – Missing Authorization to Unauthenticated Arbitrary File Sharing via 'file_id' Parameter (nmedia-user-file-uploader)
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are…
2026-01-26
CVE-2025-67970: Schedula <= 1.0 – Missing Authorization (schedula-smart-appointment-booking)
The Schedula – Smart Appointment Booking plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-26
CVE-2026-24530: WebP Conversion <= 2.1 – Missing Authorization (webp-conversion)
The WebP Conversion plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 2.1. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-26
CVE-2026-24521: Kama Thumbnail <= 3.5.1 – Cross-Site Request Forgery (kama-thumbnail)
The Kama Thumbnail plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.1. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to perform an unauthorized action via a forged request granted they can trick a site administrator into…
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
