
AI-Powered CVE Analysis for WordPress Plugins
We use AI to automate the differential analysis between vulnerable and patched plugin versions to understand and interpret the security issues. What we share here is research-grade proof of concept demonstrations that are then fed back into our endpoint firewall service.
WordPress Proof of Concepts
AI-assisted vulnerability analysis with PoC demonstration
2026-01-21
CVE-2025-67963: Movie Booking <= 1.1.5 – Unauthenticated Arbitrary File Deletion (movie-booking)
The Movie Booking plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 1.1.5. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such…
2026-01-21
CVE-2025-67966: Lawyer Directory <= 1.3.3 – Authenticated (Subscriber+) Privilege Escalation (lawyer-directory)
The Lawyer Directory plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.3.3.This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.
2026-01-21
CVE-2026-24564: Textmetrics <= 3.6.3 – Authenticated (Subscriber+) Arbitrary Shortcode Execution (webtexttool)
The The Textmetrics plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.6.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to…
2026-01-21
CVE-2025-69318: JobWP <= 2.4.5 – Unauthenticated Stored Cross-Site Scripting (jobwp)
The JobWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
2026-01-21
CVE-2026-24565: B Accordion <= 2.0.2 – Authenticated (Contributor+) Information Exposure (b-accordion)
The Accordion – Add Horizontal / Vertical Accordion in WP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive user or configuration data.
2026-01-21
CVE-2025-68039: BackItUp <= 2.1.0 – Missing Authorization (wp-backitup)
The BackItUp plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to perform an unauthorized action.
2026-01-21
CVE-2026-24570: Edwiser Bridge <= 4.3.2 – Missing Authorization (edwiser-bridge)
The Edwiser Bridge plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform an unauthorized action.
2026-01-21
CVE-2026-24990: WP Docs <= 2.2.8 – Missing Authorization (wp-docs)
The WP Docs plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.
2026-01-21
CVE-2025-68035: Tabby Checkout <= 5.8.4 – Unauthenticated Information Exposure (tabby-checkout)
The Tabby Checkout plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.8.4. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data.
2026-01-21
CVE-2026-24568: Travel <= 11.1.0 – Missing Authorization (wp-travel)
The Travel plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 11.1.0. This makes it possible for unauthenticated attackers to perform an unauthorized action.
How Atomic Edge Works
Simple Setup. Powerful Security.
Atomic Edge acts as a security layer between your website & the internet — inspecting, filtering, and blocking malicious traffic before it ever reaches
your application.
