CVE-2026-4267 affects Query Monitor and it is a reflected cross site scripting vulnerability that can be triggered by an unauthenticated attacker and executed in the browser of a logged in user who can view Query Monitor output. Query Monitor is often installed on development and staging sites, but it is also frequently left enabled on production environments during troubleshooting, which increases the chance that administrators will have it active while browsing the dashboard. The bug is dangerous because it sits inside a diagnostic panel that administrators trust. Once script execution is achieved in an admin session, the attacker can move from a simple reflected injection to nonce theft and privileged state changing actions in the WordPress backend.
CVE-2026-1710 – WooPayments – Unauthenticated Checkout UI Cache Poisoning/DOS via Public save_upe_appearance AJAX Endpoint – POC

CVE-2026-1710 affects WooPayments and it is an unauthenticated cache poisoning and denial of service vulnerability that targets the checkout payment UI rather than the WordPress admin. The core issue is that a public AJAX endpoint allows any visitor to submit attacker controlled Stripe Elements appearance configuration, and the plugin stores that data in globally shared transients that are later consumed by all shoppers. This transforms a single anonymous request into site wide persistent checkout manipulation that can last for up to a day. On stores where card payments are a primary revenue path, disrupting the payment form is operationally severe because it blocks checkout completion for real customers while looking like a normal front end glitch.
CVE-2026-3098 – Smart Slider 3 – LFI (Subscriber+) – POC

CVE-2026-3098 affects Smart Slider 3 and it enables an authenticated low privilege user to turn normal slider and image management flows into an arbitrary local file read. The practical impact is not limited to viewing a file inside the WordPress UI. The vulnerability chain can package the contents of server files into an exported Smart Slider archive, which the attacker can then download and inspect offline. This is dangerous because the exported artifact becomes a clean exfiltration channel for configuration files, credentials, and application secrets that should never leave the server. With an install base around 800k plus, this is a realistic risk for many sites where Subscriber accounts exist through registration, memberships, or WooCommerce, and where plugin permissions are often assumed to be safe by default.
Plugin Security Certification (PSC-2026-64641): “Speed Optimizer” – Version 7.7.7

Performance and caching plugins are security-relevant because they introduce high-impact configuration inside wp-admin and can directly affect availability and content delivery behavior. If access control, request integrity, or output handling is weak, attackers may force cache purges or mode changes via CSRF, expose sensitive diagnostics, or manipulate settings that change how pages and assets are cached and served. Speed Optimizer – The All-In-One Performance-Boosting Plugin version 7.7.7 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64641, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for performance management and caching tooling.
Plugin Security Certification (PSC-2026-64640): “Modula Image Gallery” – Version 2.14.22

Gallery plugins are security-relevant because they render user-controlled presentation data (titles, captions, alt text, links) across public pages and often provide rich admin-side builders and lightbox features. If output handling, access control, or request integrity is weak, attackers can target stored XSS through captions or settings, force configuration changes via CSRF, or expose media metadata through misprotected endpoints. Modula Image Gallery – Photo Grid & Video Gallery version 2.14.22 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64640, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for media gallery and front-end rendering plugins.
Plugin Security Certification (PSC-2026-64639): “Simple Author Box” – Version 2.59

Author box plugins are security-relevant because they render user-controlled profile data across the site, often including author bio text, website links, and social profiles. If output encoding, access control, or request integrity is weak, these surfaces can become a path to stored XSS, unauthorized profile metadata exposure, or CSRF-driven settings changes. Simple Author Box version 2.59 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64639, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for author profile and bio display plugins.
Plugin Security Certification (PSC-2026-64638): “Filester” – Version 2.0.2

File manager plugins are security-relevant by design because they provide direct filesystem access from wp-admin, including upload, download, edit, delete, and archive operations that normally require FTP or hosting panel access. If access control, request integrity, or path handling is weak, these features can become a shortcut to data exposure, site defacement, or availability impact. File Manager Pro – Filester version 2.0.2 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64638, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress file management tools.
Plugin Security Certification (PSC-2026-64635): “Aruba HiSpeed Cache” – Version 3.0.10

Caching integrations are security-relevant because they introduce high-impact configuration inside wp-admin and can directly affect availability and content delivery behavior. If access control, request integrity, or output handling is weak, attackers may force cache purges or mode changes via CSRF, expose sensitive diagnostics, or manipulate settings that impact how pages are cached and served. Aruba HiSpeed Cache version 3.0.10 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64635, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for hosting-cache and performance management plugins.
Plugin Security Certification (PSC-2026-64634): “Prime Slider” – Version 4.1.10

Slider and page builder addons expand the WordPress attack surface because they introduce rich front-end rendering, store complex widget settings, and often allow custom styling or script-like configuration through builder controls. In practice, weaknesses here most commonly translate into stored XSS through unsafe output, CSRF-driven settings changes, unauthorized access to editing features, or information disclosure via misprotected endpoints and diagnostics. Prime Slider – Addons for Elementor version 4.1.10 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64634, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for Elementor widget and content-rendering plugins.
Plugin Security Certification (PSC-2026-64633): “Migrate Guru” – Version 6.28

Migration plugins are security-relevant because they operate with high privilege, touch both the filesystem and the database, and often require sensitive destination details like FTP/cPanel credentials or a migration key. If access control, request integrity, or input/output handling is weak, attackers may trigger unauthorized migrations, leak migration metadata, force configuration changes via CSRF, or abuse migration logic to cause resource exhaustion. Migrate Guru – Site Migration & Cloning version 6.28 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64633, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for site migration and cloning workflows.