CVE-2025-13753 – WP Table Builder – Incorrect Authorization to Authenticated (Subscriber+) Arbitrary Table Creation – POC

CVE-2025-13753 – WP Table Builder – Incorrect Authorization to Authenticated (Subscriber+) Arbitrary Table Creation – POC

CVE-2025-13753 affects WP Table Builder and it is an incorrect authorization vulnerability where a low privilege authenticated user can create new tables even when the site owner configured the plugin to allow table management only for specific roles. The bug is subtle because the plugin does have an authorization model and a dedicated allowed roles gate, yet one AJAX entry point introduces an alternative access path that relies only on possession of a nonce like value and skips the capability check entirely. In practical terms this means a Subscriber can perform a privileged content creation action as soon as they can see or steal the security code that is exposed in front end or editor context, which breaks the expected role separation that administrators rely on in multi user WordPress installations.

CVE-2026-3231 – Checkout Field Editor (Checkout Manager) for WooCommerce – Unauthenticated Stored XSS – POC

CVE-2026-3231 – Checkout Field Editor (Checkout Manager) for WooCommerce – Unauthenticated Stored XSS – POC

CVE-2026-3231 affects Checkout Field Editor Checkout Manager for WooCommerce and it is an unauthenticated stored cross site scripting vulnerability that can fire in high value contexts such as the WooCommerce admin order screen and customer order details. The reason this matters is that checkout fields sit directly on the boundary between untrusted shopper input and trusted back office workflows. If an attacker can store HTML that later executes in an administrator’s browser, the impact quickly escalates from a cosmetic script popup into session theft and administrative actions performed in the background. With an install base around 500k plus, the vulnerable pattern is relevant for many production stores, especially those that use custom checkout fields to collect contact data, delivery preferences, or consent options.

CVE-2026-3585 – The Events Calendar – LFI Author+ – POC

CVE-2026-3585 – The Events Calendar – LFI Author+ – POC

CVE-2026-3585 affects The Events Calendar and its Event Aggregator import workflow. It is an authenticated Local File Inclusion issue in the CSV import path where a low privilege user who can manage event imports can point the importer at an arbitrary local path and force the server to open it as if it were a CSV file. Even though this does not look like code execution, the security impact is serious because it turns an editorial role into a tool for reading sensitive server files that were never meant to be exposed through the application. Given the plugin’s large install base around 700k plus, this becomes especially relevant on multi author sites and organizations where event staff have elevated content permissions but should not have access to server level secrets.

CVE-2025-14980 – BetterDocs – OpenAI API Key Disclosure to Contributor+ via Admin Script Localization – POC

CVE-2025-14980 – BetterDocs – OpenAI API Key Disclosure to Contributor+ via Admin Script Localization – POC

CVE-2025-14980 affects BetterDocs and it exposes a high value secret through a surprisingly common WordPress anti pattern. The plugin places an OpenAI API key into a JavaScript object that is printed in the admin area, and that admin screen is reachable by Contributor level users. This means a user who is not trusted to manage integrations can still read the key simply by opening the BetterDocs dashboard and inspecting the page source or DevTools network responses. The immediate consequence is that a low privilege account can obtain a reusable external credential that is valid outside WordPress, which changes the risk from a local dashboard information leak into a broader third party account abuse scenario.

CVE-2025-13749 – Clearfy – Silent update suppression via CSRF in Clearfy Updates Manager – POC

CVE-2025-13749 – Clearfy – Silent update suppression via CSRF in Clearfy Updates Manager – POC

CVE-2025-13749 affects Clearfy version 2.4.0 and it is a Cross Site Request Forgery weakness inside the Clearfy Updates Manager module that allows an attacker to change update visibility and auto update behavior without the administrator’s consent. The most important security property here is stealth. Once the request succeeds, the targeted plugin or theme immediately disappears from the update list and the familiar yellow update banner no longer appears, so the administrator receives no obvious signal that anything changed. This is not a flashy exploit like code execution, but it is a persistence enabler that keeps vulnerable software in place and increases compromise probability over time because patching is silently disabled.

CVE-2025-14059 – Email Kit – Local File Inclusion (LFI) Author+ – POC

CVE-2025-14059 – Email Kit – Local File Inclusion (LFI) Author+ – POC

CVE-2025-14059 affects Email Kit and it is a local file inclusion vulnerability that turns a normal email template feature into a reliable arbitrary file read primitive for an authenticated Author level user. The key reason it is serious is that it is not only about reading a file on the server. It also provides a built in exfiltration channel because the stolen file content can be delivered outward through MetForm confirmation emails to an attacker controlled mailbox. On real sites this means an Author account, which is common on marketing and content teams, can reach high value secrets like wp-config.php database credentials and authentication keys without needing administrator access, and without any direct file download feature being present.

CVE-2025-9294 – Quiz And Survey Master (QSM) – Missing Authorization to Authenticated (Subscriber+) Quiz Results Deletion – POC

CVE-2025-9294 – Quiz And Survey Master (QSM) – Missing Authorization to Authenticated (Subscriber+) Quiz Results Deletion – POC

CVE-2025-9294 affects Quiz And Survey Master QSM and it is a missing authorization vulnerability that allows a low privilege authenticated user to delete quiz results they should never be able to touch. The issue is not about guessing passwords or bypassing login. It is about a server side action that performs a destructive change while trusting that a generic nonce equals permission. On real sites QSM results are often business data. They can represent leads, assessments, training completions, exam attempts, customer feedback, or any workflow where results are used for decisions and reporting. Because the plugin is widely deployed at around 50k plus installs, the scenario of a site with many Subscriber accounts is common, which makes this a realistic integrity and availability problem rather than a purely theoretical one.

Plugin Security Certification (PSC-2026-64628): “Favicon by RealFaviconGenerator” – Version 1.3.45

Plugin Security Certification (PSC-2026-64628): “Favicon by RealFaviconGenerator” – Version 1.3.45

Favicon by RealFaviconGenerator (v1.3.45) is a WordPress plugin that automates the generation and deployment of platform-compatible favicons for desktop browsers, iOS devices, Android devices, Windows tablets, and more.

Modern favicon implementation requires multiple image sizes, platform-specific declarations, and compliance with different UI standards. This plugin simplifies the process by integrating WordPress with the RealFaviconGenerator service, generating all required assets in seconds.

Built for websites running on WordPress, the plugin eliminates manual favicon configuration while ensuring compatibility across browsers and operating systems.

Because the plugin interacts with an external generation service, performs file operations, and modifies theme headers, a structured security audit was conducted.

Plugin Security Certification (PSC-2026-64627): “All 404 Redirect to Homepage” – Version 5.5

Plugin Security Certification (PSC-2026-64627): “All 404 Redirect to Homepage” – Version 5.5

All 404 Redirect to Homepage (v5.5) is a WordPress plugin designed to automatically redirect 404 error pages to a specified destination using 301 SEO redirects. Instead of allowing visitors to encounter broken links, the plugin routes them to the homepage or a custom URL defined by the administrator.

Built for websites running on WordPress, the plugin focuses on improving SEO performance and user experience by minimizing exposure to 404 errors and preserving link equity.

However, because redirection logic directly affects HTTP responses and routing behavior, secure implementation is critical. Improper redirect handling can introduce open redirect vulnerabilities, redirect loops, or SEO manipulation vectors. Therefore, this plugin underwent a structured security audit.

Plugin Security Certification (PSC-2026-64626): “Instant Indexing for Google” – Version 1.1.22

Plugin Security Certification (PSC-2026-64626): “Instant Indexing for Google” – Version 1.1.22

Instant Indexing by Rank Math is a WordPress plugin that allows website owners to submit crawl requests to Google using the Google Indexing API immediately after publishing or updating content. Instead of waiting for standard search engine discovery cycles, the plugin automates indexing notifications directly from the WordPress dashboard.

Designed for websites running on WordPress, the plugin enables automated and manual submission of URLs to Google for faster crawling and indexing.

Google officially recommends the Indexing API primarily for Job Posting and Live Streaming websites. However, the plugin allows broader usage, and administrators should configure it responsibly.