CVE-2025-13749 – Clearfy – Silent update suppression via CSRF in Clearfy Updates Manager – POC

CVE-2025-13749 – Clearfy – Silent update suppression via CSRF in Clearfy Updates Manager – POC

CVE-2025-13749 affects Clearfy version 2.4.0 and it is a Cross Site Request Forgery weakness inside the Clearfy Updates Manager module that allows an attacker to change update visibility and auto update behavior without the administrator’s consent. The most important security property here is stealth. Once the request succeeds, the targeted plugin or theme immediately disappears from the update list and the familiar yellow update banner no longer appears, so the administrator receives no obvious signal that anything changed. This is not a flashy exploit like code execution, but it is a persistence enabler that keeps vulnerable software in place and increases compromise probability over time because patching is silently disabled.

CVE-2025-14059 – Email Kit – Local File Inclusion (LFI) Author+ – POC

CVE-2025-14059 – Email Kit – Local File Inclusion (LFI) Author+ – POC

CVE-2025-14059 affects Email Kit and it is a local file inclusion vulnerability that turns a normal email template feature into a reliable arbitrary file read primitive for an authenticated Author level user. The key reason it is serious is that it is not only about reading a file on the server. It also provides a built in exfiltration channel because the stolen file content can be delivered outward through MetForm confirmation emails to an attacker controlled mailbox. On real sites this means an Author account, which is common on marketing and content teams, can reach high value secrets like wp-config.php database credentials and authentication keys without needing administrator access, and without any direct file download feature being present.

CVE-2025-9294 – Quiz And Survey Master (QSM) – Missing Authorization to Authenticated (Subscriber+) Quiz Results Deletion – POC

CVE-2025-9294 – Quiz And Survey Master (QSM) – Missing Authorization to Authenticated (Subscriber+) Quiz Results Deletion – POC

CVE-2025-9294 affects Quiz And Survey Master QSM and it is a missing authorization vulnerability that allows a low privilege authenticated user to delete quiz results they should never be able to touch. The issue is not about guessing passwords or bypassing login. It is about a server side action that performs a destructive change while trusting that a generic nonce equals permission. On real sites QSM results are often business data. They can represent leads, assessments, training completions, exam attempts, customer feedback, or any workflow where results are used for decisions and reporting. Because the plugin is widely deployed at around 50k plus installs, the scenario of a site with many Subscriber accounts is common, which makes this a realistic integrity and availability problem rather than a purely theoretical one.

Plugin Security Certification (PSC-2026-64625): “Extendify” – Version 2.4.0

Plugin Security Certification (PSC-2026-64625): “Extendify” – Version 2.4.0

Design libraries and site-building assistants accelerate WordPress creation, but they also expand the attack surface because they add editor-side UI, insert prebuilt content into posts/pages, and often rely on remote content delivery to fetch patterns and layouts. Weaknesses here can translate into stored XSS through unsafe pattern content insertion, authorization issues around who can import or modify design assets, CSRF-driven changes to editor behavior, or information disclosure through misconfigured endpoints and diagnostics. Extendify version 2.4.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64625, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for Gutenberg design libraries and editor augmentation tools.

Plugin Security Certification (PSC-2026-64624): “Cookie Notice” – Version 2.5.13

Plugin Security Certification (PSC-2026-64624): “Cookie Notice” – Version 2.5.13

Cookie notice plugins look “simple”, but they are security-relevant because they influence front-end script execution, store site-wide consent settings, and often expose customization fields that end up rendered for every visitor. If access control, request integrity, or output handling is weak, attackers can aim for stored/reflected XSS in banner content, CSRF-driven settings changes (silently altering consent behavior), or information exposure through misprotected endpoints and diagnostics. Cookie Notice & Compliance for GDPR / CCPA version 2.5.13 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64624, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for cookie notice and consent-management plugins.

Plugin Security Certification (PSC-2026-64623): “Smash Balloon Social Photo Feed” – Version 6.10.0

Plugin Security Certification (PSC-2026-64623): “Smash Balloon Social Photo Feed” – Version 6.10.0

Social feed plugins are valuable for keeping a website fresh, but they also expand the attack surface because they integrate with external platforms, render dynamic content on the front end, and store configuration that can include display templates, access tokens, and connection metadata. Weaknesses in access control, request integrity, or output handling can translate into stored XSS in rendered feed elements, CSRF-driven settings changes, data leakage through misprotected endpoints, or unsafe exposure of integration state. Smash Balloon Social Photo Feed – Easy Social Feeds Plugin version 6.10.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64623, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for social media embedding and feed-rendering plugins.

Plugin Security Certification (PSC-2026-64622): “Regenerate Thumbnails” – Version 3.1.6

Plugin Security Certification (PSC-2026-64622): “Regenerate Thumbnails” – Version 3.1.6

Media handling plugins may look “utility-only”, but they are security-relevant because they perform privileged operations on the filesystem, process large batches of content, and expose admin-side workflows that can be abused for resource exhaustion or unsafe file operations if protections are weak. Thumbnail regeneration, in particular, touches sensitive surfaces such as uploads directory write/delete, image metadata processing, and admin actions that can be triggered repeatedly. Regenerate Thumbnails version 3.1.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64622, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for media processing and batch maintenance tools.

Plugin Security Certification (PSC-2026-64621): “OptinMonster” – Version 2.16.22

Plugin Security Certification (PSC-2026-64621): “OptinMonster” – Version 2.16.22

Lead generation plugins are high-value targets because they sit at the intersection of front-end user interaction, dynamic content rendering, and conversion tracking. They commonly introduce new UI surfaces (popups, bars, inline optins), store campaign configuration, and integrate with external marketing services — which means weaknesses can translate into stored/reflected XSS in campaign output, CSRF-driven configuration changes, leakage of lead or account metadata, or abuse of endpoints used to render and manage campaigns. Popup Builder & Popup Maker for WordPress – OptinMonster Email Marketing and Lead Generation version 2.16.22 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64621, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for marketing, popup, and opt-in plugins.

Plugin Security Certification (PSC-2026-64620): “Speculative Loading” – Version 1.6.0

Plugin Security Certification (PSC-2026-64620): “Speculative Loading” – Version 1.6.0

Performance optimization plugins can be security-relevant even when they don’t “handle data,” because they influence front-end execution and can change how and when pages are loaded. Speculative loading, in particular, can trigger background navigations (prefetch/prerender) based on user interaction, which means weak defaults or poor exclusions could amplify server load (availability risk), accidentally pre-load state-changing URLs, or expose unsafe rendering surfaces if configuration is not handled defensively. Speculative Loading version 1.6.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64620, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for performance and browser preloading features.

Plugin Security Certification (PSC-2026-64619): “Performant Translations” – Version 1.2.0

Plugin Security Certification (PSC-2026-64619): “Performant Translations” – Version 1.2.0

Translation performance plugins are security-relevant because they operate on the boundary between localization runtime and filesystem-backed caches, generating and managing translation artifacts that affect how content is rendered across the entire site. If file handling, path validation, or access control is weak, attackers may try to influence which files are read or written, abuse conversion routines to cause resource exhaustion, or inject unsafe strings into admin-side status views. Performant Translations version 1.2.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64619, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for performance and localization tooling.