CVE-2026-1906 affects PDF Invoices and Packing Slips for WooCommerce and it is a broken access control vulnerability that allows an authenticated low privilege user to modify business critical EDI and Peppol identifiers for orders they do not own. The weakness sits in an AJAX handler that updates order meta and user meta based on an attacker supplied order_id and values payload. In real ecommerce deployments, those identifiers can determine where electronic invoices and structured business documents are delivered. When a customer can change them for other customers, the impact is not only data corruption. It can become misrouting of invoices and potential leakage of business documents to the wrong endpoint, which raises both integrity and confidentiality concerns in addition to operational disruption. With an install base around 300k plus, this is a high exposure class of issue for stores that enable invoice or e invoice flows.
CVE-2025-11737- VK All in One Expansion Unit – Stored XSS via Contributor+ – POC

CVE-2025-11737 affects VK All in One Expansion Unit and it is a stored cross site scripting vulnerability that can be triggered by a Contributor level user through a post level meta field named SNS Title. The vulnerability is dangerous because it lands in the page head as Open Graph metadata, which means it executes in a high trust context on every page view where the affected post is rendered. This is not a narrow admin only issue. Once the malicious value is stored, it can reach front end visitors and also administrators reviewing content, and it can become a persistent trap that fires repeatedly. With an install base around 100k plus, this is relevant to many multi author WordPress sites where Contributors exist by design.
Plugin Security Certification (PSC-2026-64654): “Advanced Editor Tools” – Version 5.9.2

Editor enhancement plugins operate directly on the boundary between content creation, rich-text formatting, block editor behavior, Classic Editor compatibility, and front-end rendering. These plugins influence how authors create content, how formatting is stored, how editor settings are applied, and how HTML produced by rich-text tools eventually appears on public pages. A weakness in this class of plugin can lead to stored XSS through editor content or settings, unauthorized configuration changes, unsafe handling of imported settings, editor privilege boundary failures, or rendering issues where user-controlled formatting reaches HTML, CSS, or attribute contexts. Advanced Editor Tools version 5.9.2, previously known as TinyMCE Advanced, has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64654, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress editor, TinyMCE, Classic Paragraph, toolbar customization, and rich-text formatting plugins.
Plugin Security Certification (PSC-2026-64653): “Really Simple SSL” – Version 9.5.10.1

Security and SSL enforcement plugins operate across some of the most sensitive trust boundaries in WordPress because they can influence HTTPS migration, redirect behavior, security headers, login protection, two-factor authentication, vulnerability detection, and site hardening controls. Weaknesses in this class of plugin can affect confidentiality, session safety, authentication integrity, administrative access control, or the reliability of security configuration across the entire site. Really Simple Security – Simple and Performant Security (formerly Really Simple SSL) version 9.5.10.1 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64653, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for SSL, hardening, login protection, vulnerability monitoring, and WordPress security plugins.
CVE-2025-14895- PopupKit – Missing Authorization to Subscribers View/Delete Analytics Reset – POC

CVE-2025-14895 affects PopupKit and it is a missing authorization vulnerability in REST endpoints that should be restricted to administrators but are reachable by any authenticated user who can obtain a WordPress REST nonce. The most important point is that the endpoint is not just leaking harmless counters. It can return and delete records that represent marketing leads and subscriber activity, which are often treated as sensitive business assets. When a Subscriber can access this data, the plugin breaks the expected privacy and role separation model of WordPress, and it also creates a direct integrity issue because the same low privilege user can erase records and undermine reporting. This vulnerability is particularly relevant on sites with public registration and large numbers of low privilege accounts, which is common in ecommerce, memberships, and community driven properties.
Plugin Security Certification (PSC-2026-64652): “WPIDE” – Version 3.5.6

File manager and code editor plugins operate on one of the most security-critical boundaries in WordPress because they provide direct access to site files, plugin and theme code, uploaded assets, archive operations, and in some cases filesystem-level modification workflows from inside wp-admin. A weakness in this class of plugin can lead to arbitrary file upload, unauthorized file read or deletion, stored XSS through file metadata or previews, privilege escalation, remote code execution, or full site compromise if attackers gain access to unsafe file editing paths. WPIDE – File Manager & Code Editor version 3.5.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64652, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress file manager, code editor, archive handling, and filesystem administration plugins.
Plugin Security Certification (PSC-2026-64651): “UiCore Animate” – Version 2.2.4

Animation and interaction plugins operate on a sensitive boundary between front-end rendering, visual builder controls, Gutenberg block behavior, Elementor widget configuration, and client-side JavaScript execution. These plugins often modify how content appears, moves, loads, transitions between pages, and reacts to scrolling or user interaction. A weakness in this class of plugin can lead to stored XSS through animation settings, unsafe rendering of visual effects, unauthorized modification of design behavior, CSRF against administrators, or broken front-end integrity when dynamic animation data is injected into markup or scripts. UiCore Animate – Free Animations, Transitions, and Interactions Addon for Elementor & Gutenberg blocks version 2.2.4 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64651, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for animation, transition, visual builder, and block-enhancement plugins.
Plugin Security Certification (PSC-2026-64650): “Booking Calendar” – Version 10.15.6

Booking and reservation plugins operate across a sensitive boundary between public form submission, calendar availability, customer-provided booking data, admin-side reservation management, and in some configurations external calendar synchronization. These plugins often process names, contact details, selected dates, time slots, service requests, event information, and notification templates, while also controlling whether a date or resource can be booked. A weakness in this class of plugin can lead to stored XSS through booking fields, unauthorized booking manipulation, information disclosure through request listings, CSRF against administrators, double-booking logic abuse, or unsafe synchronization behavior. Booking Calendar version 10.15.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64650, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for booking, appointment, reservation, calendar, and form-management plugins.
Plugin Security Certification (PSC-2026-64649): “YayMail” – Version 4.4.0

WooCommerce email customization plugins operate on a sensitive boundary between order data, customer communication, template rendering, and admin-side content editing. These plugins often process customer names, billing and shipping details, order metadata, payment-related labels, coupons, custom fields, and transactional email content. A weakness in this class of plugin can lead to stored XSS in email templates or admin previews, unauthorized modification of transactional communications, data leakage through shortcodes or preview logic, or abuse of import/export and template management functionality. YayMail – WooCommerce Email Customizer version 4.4.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64649, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WooCommerce email template, shortcode, preview, and customization plugins.
Plugin Security Certification (PSC-2026-64648): “Direct Checkout for WooCommerce” – Version 3.6.6

Checkout optimization plugins operate directly on one of the most commercially sensitive workflows in WordPress: the path between product selection and order completion. Because these plugins modify cart behavior, checkout redirects, AJAX add-to-cart flows, and checkout field visibility, weaknesses in this class of software can affect both security and business integrity. Improper handling of redirects, checkout configuration, request validation, or administrative settings may lead to unauthorized behavior, data exposure, stored XSS, CSRF, or broken transaction flows. Direct Checkout for WooCommerce version 3.6.6 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64648, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WooCommerce checkout, cart, redirect, and purchase-flow optimization plugins.