Plugin Security Certification (PSC-2026-64635): “Aruba HiSpeed Cache” – Version 3.0.10

Plugin Security Certification (PSC-2026-64635): “Aruba HiSpeed Cache” – Version 3.0.10

Caching integrations are security-relevant because they introduce high-impact configuration inside wp-admin and can directly affect availability and content delivery behavior. If access control, request integrity, or output handling is weak, attackers may force cache purges or mode changes via CSRF, expose sensitive diagnostics, or manipulate settings that impact how pages are cached and served. Aruba HiSpeed Cache version 3.0.10 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64635, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for hosting-cache and performance management plugins.

Plugin Security Certification (PSC-2026-64634): “Prime Slider” – Version 4.1.10

Plugin Security Certification (PSC-2026-64634): “Prime Slider” – Version 4.1.10

Slider and page builder addons expand the WordPress attack surface because they introduce rich front-end rendering, store complex widget settings, and often allow custom styling or script-like configuration through builder controls. In practice, weaknesses here most commonly translate into stored XSS through unsafe output, CSRF-driven settings changes, unauthorized access to editing features, or information disclosure via misprotected endpoints and diagnostics. Prime Slider – Addons for Elementor version 4.1.10 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64634, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for Elementor widget and content-rendering plugins.

Plugin Security Certification (PSC-2026-64633): “Migrate Guru” – Version 6.28

Plugin Security Certification (PSC-2026-64633): “Migrate Guru” – Version 6.28

Migration plugins are security-relevant because they operate with high privilege, touch both the filesystem and the database, and often require sensitive destination details like FTP/cPanel credentials or a migration key. If access control, request integrity, or input/output handling is weak, attackers may trigger unauthorized migrations, leak migration metadata, force configuration changes via CSRF, or abuse migration logic to cause resource exhaustion. Migrate Guru – Site Migration & Cloning version 6.28 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64633, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for site migration and cloning workflows.

Plugin Security Certification (PSC-2026-64632): “MalCare Security” – Version 6.39

Plugin Security Certification (PSC-2026-64632): “MalCare Security” – Version 6.39

Security plugins are uniquely sensitive in WordPress because they operate with high privilege, touch authentication and request filtering, and often integrate with external scanning and firewall services. If access control, request integrity, or output handling is weak, attackers may force configuration changes via CSRF, abuse endpoints to leak site security metadata, or inject malicious content into admin-facing reports. MalCare WordPress Security Plugin – Malware Scanner, Cleaner, Security Firewall version 6.39 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64632, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for WordPress security and monitoring plugins.

Plugin Security Certification (PSC-2026-64631): “Cloudflare” – Version 4.14.2

Plugin Security Certification (PSC-2026-64631): “Cloudflare” – Version 4.14.2

CDN and caching integrations are security-relevant because they introduce privileged configuration flows inside wp-admin, handle API tokens, and can directly affect availability and security posture at the edge. If access control, request integrity, or output handling is weak, attackers may force cache purges or mode changes via CSRF, expose sensitive integration metadata, or manipulate settings that impact how the site is protected and cached. Cloudflare version 4.14.2 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64631, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for CDN, caching, and edge-security integration plugins.

Plugin Security Certification (PSC-2026-64630): “SpeedyCache – Cache, Optimization, Performance” – Version 1.3.7

Plugin Security Certification (PSC-2026-64630): “SpeedyCache – Cache, Optimization, Performance” – Version 1.3.7

SpeedyCache – Cache, Optimization, Performance (v1.3.7) is a WordPress performance plugin designed to improve website speed through caching, minification, compression, and resource optimization. By generating static cache files and optimizing frontend assets, the plugin reduces server load and accelerates page delivery.

Built for websites running on WordPress, SpeedyCache provides a comprehensive optimization toolkit while maintaining compatibility with shared hosting environments and CDN integrations.

Given its deep interaction with caching layers, file generation, HTTP headers, and resource processing, a detailed security audit was conducted.

CVE-2026-1430 – WP Lightbox 2 Stored XSS

CVE-2026-1430 – WP Lightbox 2 Stored XSS

WP Lightbox 2 is a WordPress plugin designed to add a responsive lightbox overlay effect to images displayed on a website. The plugin automatically enables lightbox functionality for images and galleries and provides several configuration options, including animation settings, overlay opacity, image information display, and additional descriptive text.

During security testing, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the plugin’s settings panel. The issue allows malicious JavaScript to be injected through the “Additional text below image info” configuration field. Because this value is stored and later rendered on pages where the lightbox is used, the injected script may execute in the browsers of site visitors or administrators.

Plugin Security Certification (PSC-2026-64629): “MailPoet” – Version 5.22.1

Plugin Security Certification (PSC-2026-64629): “MailPoet” – Version 5.22.1

Email marketing plugins are high-value targets because they centralize subscriber data, campaign content, and automation logic inside WordPress, often alongside WooCommerce purchase signals and transactional email customization. That combination creates multiple security-sensitive surfaces: admin dashboards, form endpoints, stored templates that render HTML, scheduled jobs, and integrations with sending methods (SMTP/SES/SendGrid or vendor sending services). Weaknesses here commonly translate into stored XSS in templates/forms, CSRF-driven configuration changes, unauthorized access to subscriber lists, or leakage of integration metadata. MailPoet – Newsletters, Email Marketing, and Automation version 5.22.1 has successfully completed the CleanTalk Plugin Security Certification process and received PSC-2026-64629, confirming that the plugin was reviewed from a secure code perspective with attention to the most common exploitation paths for newsletter, automation, and WooCommerce email workflows.

CVE-2025-13393 – Featured Image from URL (FIFU) – Authenticated (Contributor+) Server-Side Request Forgery via ‘fifu_input_url’ – POC

CVE-2025-13393 – Featured Image from URL (FIFU) – Authenticated (Contributor+) Server-Side Request Forgery via ‘fifu_input_url’ – POC

CVE-2025-13393 affects Featured Image from URL FIFU and it enables a Contributor level user to coerce the WordPress server into making outbound requests to attacker chosen destinations during the Elementor save workflow. The vulnerability is blind server side request forgery because the plugin does not return the fetched response body to the attacker. Instead it triggers a network request as a side effect of extracting image dimensions. This is still high impact because the attacker gains a reliable primitive to reach internal hosts that are not accessible from the internet, which can be used for reconnaissance and chaining. Install base around 70k plus makes this relevant to real sites where Contributors and Authors are common in editorial and marketing teams.

CVE-2025-13753 – WP Table Builder – Incorrect Authorization to Authenticated (Subscriber+) Arbitrary Table Creation – POC

CVE-2025-13753 – WP Table Builder – Incorrect Authorization to Authenticated (Subscriber+) Arbitrary Table Creation – POC

CVE-2025-13753 affects WP Table Builder and it is an incorrect authorization vulnerability where a low privilege authenticated user can create new tables even when the site owner configured the plugin to allow table management only for specific roles. The bug is subtle because the plugin does have an authorization model and a dedicated allowed roles gate, yet one AJAX entry point introduces an alternative access path that relies only on possession of a nonce like value and skips the capability check entirely. In practical terms this means a Subscriber can perform a privileged content creation action as soon as they can see or steal the security code that is exposed in front end or editor context, which breaks the expected role separation that administrators rely on in multi user WordPress installations.