CVE-2025-14895 affects PopupKit and it is a missing authorization vulnerability in REST endpoints that should be restricted to administrators but are reachable by any authenticated user who can obtain a WordPress REST nonce. The most important point is that the endpoint is not just leaking harmless counters. It can return and delete records that represent marketing leads and subscriber activity, which are often treated as sensitive business assets. When a Subscriber can access this data, the plugin breaks the expected privacy and role separation model of WordPress, and it also creates a direct integrity issue because the same low privilege user can erase records and undermine reporting. This vulnerability is particularly relevant on sites with public registration and large numbers of low privilege accounts, which is common in ecommerce, memberships, and community driven properties.
Plugin Security Certification (PSC-2026-64652): “WPIDE” – Version 3.5.6

File manager and code editor plugins operate on one of the most security-critical boundaries in WordPress because they provide direct access to site files, plugin and theme code, uploaded assets, archive operations, and in some cases filesystem-level modification workflows from inside wp-admin. A weakness in this class of plugin can lead to arbitrary file upload, unauthorized file read or deletion, stored XSS through file metadata or previews, privilege escalation, remote code execution, or full site compromise if attackers gain access to unsafe file editing paths. WPIDE – File Manager & Code Editor version 3.5.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64652, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress file manager, code editor, archive handling, and filesystem administration plugins.
Plugin Security Certification (PSC-2026-64651): “UiCore Animate” – Version 2.2.4

Animation and interaction plugins operate on a sensitive boundary between front-end rendering, visual builder controls, Gutenberg block behavior, Elementor widget configuration, and client-side JavaScript execution. These plugins often modify how content appears, moves, loads, transitions between pages, and reacts to scrolling or user interaction. A weakness in this class of plugin can lead to stored XSS through animation settings, unsafe rendering of visual effects, unauthorized modification of design behavior, CSRF against administrators, or broken front-end integrity when dynamic animation data is injected into markup or scripts. UiCore Animate – Free Animations, Transitions, and Interactions Addon for Elementor & Gutenberg blocks version 2.2.4 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64651, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for animation, transition, visual builder, and block-enhancement plugins.
Plugin Security Certification (PSC-2026-64650): “Booking Calendar” – Version 10.15.6

Booking and reservation plugins operate across a sensitive boundary between public form submission, calendar availability, customer-provided booking data, admin-side reservation management, and in some configurations external calendar synchronization. These plugins often process names, contact details, selected dates, time slots, service requests, event information, and notification templates, while also controlling whether a date or resource can be booked. A weakness in this class of plugin can lead to stored XSS through booking fields, unauthorized booking manipulation, information disclosure through request listings, CSRF against administrators, double-booking logic abuse, or unsafe synchronization behavior. Booking Calendar version 10.15.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64650, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for booking, appointment, reservation, calendar, and form-management plugins.
Plugin Security Certification (PSC-2026-64649): “YayMail” – Version 4.4.0

WooCommerce email customization plugins operate on a sensitive boundary between order data, customer communication, template rendering, and admin-side content editing. These plugins often process customer names, billing and shipping details, order metadata, payment-related labels, coupons, custom fields, and transactional email content. A weakness in this class of plugin can lead to stored XSS in email templates or admin previews, unauthorized modification of transactional communications, data leakage through shortcodes or preview logic, or abuse of import/export and template management functionality. YayMail – WooCommerce Email Customizer version 4.4.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64649, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WooCommerce email template, shortcode, preview, and customization plugins.
Plugin Security Certification (PSC-2026-64648): “Direct Checkout for WooCommerce” – Version 3.6.6

Checkout optimization plugins operate directly on one of the most commercially sensitive workflows in WordPress: the path between product selection and order completion. Because these plugins modify cart behavior, checkout redirects, AJAX add-to-cart flows, and checkout field visibility, weaknesses in this class of software can affect both security and business integrity. Improper handling of redirects, checkout configuration, request validation, or administrative settings may lead to unauthorized behavior, data exposure, stored XSS, CSRF, or broken transaction flows. Direct Checkout for WooCommerce version 3.6.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64648, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WooCommerce checkout, cart, redirect, and purchase-flow optimization plugins.
CVE-2026-6495 – Ajax Load More < 7.8.4 – Reflected XSS – POC
Plugin Security Certification (PSC-2026-64647): “MailPoet” – Version 5.23.2

Email marketing plugins operate across several high-risk boundaries in WordPress because they combine subscriber data handling, admin-side campaign management, form collection and segmentation, scheduled and automated sending logic, and in some deployments external delivery infrastructure. Weaknesses in this class of plugin can lead to stored XSS in administrative interfaces, unauthorized access to subscriber information, misuse of automation workflows, or abuse of privileged settings that affect site communications and user trust. MailPoet version 5.23.2 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64647, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for newsletter, subscriber management, email automation, and WooCommerce email plugins.
CVE-2026-0554 – NotificationX – Missing Authorization to Authenticated (Contributor+) Analytics Reset – POC
Plugin Security Certification (PSC-2026-64646): “Backup Migration” – Version 2.1.5.1

Backup and migration plugins sit on one of the most sensitive trust boundaries in WordPress because they routinely interact with site files, database contents, archive generation and extraction, and sometimes remote storage or cross-site transfer flows. A weakness in this class of plugin can quickly translate into unauthorized data exposure, integrity loss during restore operations, or abuse of privileged backup management features. Backup Migration version 2.1.5.1 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64646, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for backup, restore, migration, and staging plugins.
