Plugin Security Certification (PSC-2026-64618): “Broken Link Checker” – Version 2.4.7

Plugin Security Certification (PSC-2026-64618): “Broken Link Checker” – Version 2.4.7

Link checking plugins are highly valuable for SEO and user experience, but they also introduce a security-relevant surface because they crawl and request URLs, store scan results, and expose an administrative dashboard to review and bulk-fix findings. If access control, request integrity, or output handling is weak, attackers may abuse scanning logic to trigger excessive outbound requests (resource exhaustion), attempt SSRF-style probing via crafted URLs, force configuration changes via CSRF, or inject malicious strings into reports that get rendered in wp-admin. Broken Link Checker version 2.4.7 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64618, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for link monitoring and remediation plugins.

Plugin Security Certification (PSC-2026-64617): “Complianz – GDPR/CCPA Cookie Consent” – Version 7.4.4.2

Plugin Security Certification (PSC-2026-64617): “Complianz – GDPR/CCPA Cookie Consent” – Version 7.4.4.2

Cookie consent and privacy-compliance plugins are deceptively security-sensitive because they sit at the intersection of front-end script execution, visitor consent state, and site-wide configuration. They often manage banner templates, block or release third-party scripts, generate legal documents, and store consent-related settings and logs — which means weaknesses can translate into stored/reflected XSS in banners or documents, CSRF-driven configuration changes (silently altering consent behavior), data leakage via misprotected endpoints, or integrity issues in the rules that decide when scripts are allowed to run. Complianz – GDPR/CCPA Cookie Consent version 7.4.4.2 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64617, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for privacy, cookie, and consent-management plugins.

Plugin Security Certification (PSC-2026-64616): “Under Construction” – Version 4.04

Plugin Security Certification (PSC-2026-64616): “Under Construction” – Version 4.04

Maintenance mode plugins look simple, but they sit directly on a sensitive boundary: they change what anonymous visitors can access, add front-end rendering paths that run outside normal themes, and expose admin settings that control access rules (whitelists, scheduling, login links). If access control or request integrity is weak, attackers may bypass the “under construction” gate, force-enable it via CSRF to create downtime, or inject malicious markup into the maintenance page content shown to visitors or administrators. Under Construction version 4.04 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64616, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for maintenance/coming-soon plugins.

Plugin Security Certification (PSC-2026-64614): “W3 Total Cache” – Version 2.9.1

Plugin Security Certification (PSC-2026-64614): “W3 Total Cache” – Version 2.9.1

Caching and performance optimization plugins can dramatically improve page speed, but they also expand the security footprint because they sit between dynamic application logic and static delivery. A cache can unintentionally store and serve private content, expose sensitive headers or debug artifacts, or create integrity issues when minification and rewrite rules transform how resources are delivered. These plugins also tend to touch high-risk areas like wp-admin configuration, filesystem writes (cache directories, rewrite rules), and external integrations (CDNs, reverse proxies), which means weaknesses frequently translate into data leakage, stored XSS in admin previews, cache poisoning, or denial-of-service conditions. W3 Total Cache version 2.9.1 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64614, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for caching and optimization plugins.

Plugin Security Certification (PSC-2026-64613): “Advanced Custom Fields” – Version 6.7.0

Plugin Security Certification (PSC-2026-64613): “Advanced Custom Fields” – Version 6.7.0

Custom fields unlock a lot of power in WordPress, but they also expand the attack surface because they sit directly on the boundary between admin-side content modeling and front-end rendering. Field values can end up inside templates, blocks, REST responses, and admin UIs, which means weaknesses here frequently translate into stored XSS, unauthorized data exposure, or integrity issues. Advanced Custom Fields (ACF®) version 6.7.0 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64613, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for content modeling plugins.

Plugin Security Certification (PSC-2026-64611): “Database Addon for Contact Form 7” – Version 1.3.5

Plugin Security Certification (PSC-2026-64611): “Database Addon for Contact Form 7” – Version 1.3.5

Collecting form submissions is valuable, but storing them inside WordPress also creates a high value target because entries often include names, emails, phone numbers, messages, and sometimes sensitive business context. Database Addon for Contact Form 7 version 1.3.5 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64611, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for data capture and export plugins.

Plugin Security Certification (PSC-2026-64610): “GoSMTP” – Version 1.1.8

Plugin Security Certification (PSC-2026-64610): “GoSMTP” – Version 1.1.8

Email delivery is business critical, but email sending plugins also sit on a sensitive boundary where they handle SMTP credentials, API keys, admin side settings, and in some cases email logs that can contain personal data. GoSMTP version 1.1.8 has successfully completed the CleanTalk Plugin Security Certification program and received PSC-2026-64610, confirming that the plugin was assessed with a strong focus on secure coding practices and common real world WordPress attack paths.

Plugin Security Certification (PSC-2026-64609): “User Role Editor” – Version 4.64.6

Plugin Security Certification (PSC-2026-64609): “User Role Editor” – Version 4.64.6

User Role Editor v4.64.6 is a widely used WordPress administration plugin that lets site owners manage roles and capabilities through a clear checkbox based interface, making it easy to add, remove, clone, and delete roles while also supporting per user capability assignments and multisite networks. Because role and capability management directly governs access control across WordPress, any weakness in implementation could have severe impact, including unauthorized privilege changes or admin takeover paths. User Role Editor has passed CleanTalk Plugin Security Certification under PSC-2026-64609, confirming that the plugin was assessed for secure coding practices and validated against major vulnerability classes.

CVE-2025-14371 – TaxoPress – IDOR / Object‑Level Authorization Bypass to Modify Terms of Arbitrary Post – POC

CVE-2025-14371 – TaxoPress – IDOR / Object‑Level Authorization Bypass to Modify Terms of Arbitrary Post – POC

CVE-2025-14371 affects TaxoPress and it breaks a core WordPress safety boundary where a user may have access to an editor feature but should not be able to change content they cannot edit. The vulnerability allows any authenticated user who is permitted to use the TaxoPress AI metabox, typically Contributor or Author and above, to add or remove tags on posts they do not own by supplying a victim post ID. This becomes a direct content integrity issue because tags and other taxonomy terms drive search relevance, internal navigation, feeds, and SEO surfaces, meaning a low privilege account can silently reshape how content is discovered even when the same user cannot open the post editor for the target post. Install base is significant at 50k plus, so multi author environments where Contributors exist are realistic targets rather than edge cases.

CVE-2025-14163 – Premium Addons for Elementor – CSRF on Elementor Template Creation – POC

CVE-2025-14163 – Premium Addons for Elementor – CSRF on Elementor Template Creation – POC

CVE-2025-14163 is a Cross Site Request Forgery weakness in Premium Addons for Elementor that turns a normal authenticated workflow into a silent action a victim performs on an attacker’s behalf. The core problem is simple but dangerous in real operations a logged in user can be tricked into creating a new Elementor template without clicking anything and without seeing a warning, because the plugin’s AJAX action accepts a state changing request that lacks any CSRF protection. Even though the action requires a user who has edit_posts, that still covers a wide range of common roles on real sites such as Author and Editor, which means this is not limited to administrators and can be triggered against typical editorial staff who routinely browse the web while logged in.