Atomic Edge Product

AI-Powered CVE Analysis for WordPress Plugins

We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.

WordPress Proof of Concepts

AI-assisted vulnerability analysis with PoC demonstration

2026-01-23

CVE-2026-0806: WP-ClanWars <= 2.0.1 – Authenticated (Administrator+) SQL Injection via 'orderby' Parameter (wp-clanwars)

The WP-ClanWars plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append…
2026-01-23

CVE-2025-13676: JustClick registration plugin <= 0.1 – Reflected Cross-Site Scripting via PHP_SELF (justclick-subscriber)

The JustClick registration plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 0.1. This is due to insufficient input sanitization and output escaping on the `PHP_SELF` server variable. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully…
2026-01-23

CVE-2026-1095: Canto Testimonials <= 1.0 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'fx' Shortcode Attribute (canto-testimonials)

The Canto Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'fx' shortcode attribute in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in…
2026-01-23

CVE-2026-1088: Login Page Editor <= 1.2 – Cross-Site Request Forgery to Settings Update (login-page-editor)

The Login Page Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing nonce validation on the devotion_loginform_process() AJAX action. This makes it possible for unauthenticated attackers to update the plugin's login page settings via a forged request granted they can trick…
2026-01-23

CVE-2025-14630: AdminQuickbar <= 1.9.3 – Cross-Site Request Forgery to Settings Update (adminquickbar)

The AdminQuickbar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.3. This is due to missing or incorrect nonce validation on the 'saveSettings' and 'renamePost' AJAX actions. This makes it possible for unauthenticated attackers to modify plugin settings and update post titles via a forged request granted…
2026-01-23

CVE-2026-1098: CM CSS Columns <= 1.2.1 – Authenticated (Contributor+) Stored Cross-Site Scripting via 'tag' Shortcode Attribute (cm-css-columns)

The CM CSS Columns plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' shortcode attribute in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts…
2026-01-23

CVE-2025-15516: All-in-One Video Gallery 4.1.0 – 4.6.4 – Missing Authorization to Authenticated (Subscriber+) Limited User Meta Update (all-in-one-video-gallery)

The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_callback_store_user_meta() function in versions 4.1.0 to 4.6.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary string-based user meta keys for their own account.
2026-01-23

CVE-2026-1302: Meta-box GalleryMeta <= 3.0.1 – Authenticated (Editor+) Stored Cross-Site Scripting via Image Caption (meta-box-gallerymeta)

The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a…
2026-01-23

CVE-2026-0633: MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor <= 4.1.0 – Unauthenticated Form Submission Exposure via Forgeable Cookie Value (metform)

The MetForm – Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.1.0. This is due to the use of a forgeable cookie value derived only from the entry ID and current user ID without a server-side secret. This…
2026-01-23

CVE-2026-0687: Meta-box GalleryMeta <= 3.0.1 – Missing Authorization to Authenticated (Author+) Gallery Management (meta-box-gallerymeta)

The Meta-box GalleryMeta plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mb_gallery' custom post type in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Author-level access and above, to create and publish galleries.

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.

See How It Works