Plugin Security Certification (PSC-2025-64580): “AI Engine” – Version 3.1.0: Use AI with Enhanced Security

Plugin Security Certification (PSC-2025-64580): “AI Engine” – Version 3.1.0: Use AI with Enhanced Security

AI Engine is an advanced WordPress plugin designed to bridge the power of modern AI models (like GPT-4.1, Claude, Gemini, o4, and others) with the flexibility and usability of WordPress. Whether you’re aiming to build custom chatbots, generate content, translate articles, or automate content workflows, AI Engine provides a powerful and secure solution—all from within the WordPress dashboard.

With deep integrations, developer-ready APIs, and support for multiple AI providers, AI Engine allows website owners to build intelligent, interactive, and efficient websites that scale with their needs. Beyond just functionality, the plugin has undergone rigorous code-level inspection and has been certified with the Plugin Security Certification (PSC) from CleanTalk, confirming its secure development practices and strong protection measures.

Plugin Security Certification (PSC-2025-64579): “Custom Post Type UI” – Version 1.18.0: Custom Post Types with Enhanced Security

Plugin Security Certification (PSC-2025-64579): “Custom Post Type UI” – Version 1.18.0: Custom Post Types with Enhanced Security

Custom content structures are a cornerstone of advanced WordPress development. The Custom Post Type UI plugin empowers administrators and developers by offering a robust and user-friendly interface for registering and managing custom post types and taxonomies—without writing a single line of code.

Custom Post Type UI has successfully passed a comprehensive security audit and earned the Plugin Security Certification (PSC-2025-64579) from CleanTalk. This milestone confirms that the plugin adheres to the highest standards of secure coding practices, allowing users to leverage custom content types with confidence and protection.

From streamlining content architecture to enabling flexible taxonomies, CPTUI enhances WordPress functionality without compromising security.

Plugin Security Certification (PSC-2025-64578): “One Click Demo Import” – Version 3.4.0: Use Import Functionality with Enhanced Security

Plugin Security Certification (PSC-2025-64578): “One Click Demo Import” – Version 3.4.0: Use Import Functionality with Enhanced Security

When it comes to setting up WordPress themes, nothing is more frustrating for users than starting from scratch. The One Click Demo Import plugin solves this by offering a seamless, user-friendly method to load pre-built demo content with a single click. With version 3.4.0, the plugin continues to provide that convenience—now with an added layer of confidence: official Plugin Security Certification (PSC-2025-64578) from CleanTalk.

CVE-2025-3414 – Structured Content <= 1.6.4 Contributor+ – Stored XSS to JS Backdoor Creation – POC

CVE-2025-3414 – Structured Content <= 1.6.4 Contributor+  – Stored XSS to JS Backdoor Creation – POC

The Structured Content plugin helps WordPress users enhance their pages with rich JSON-LD schema.org structured data elements. It allows for the insertion of components like FAQs, job postings, events, and more, with options to display the content as visible HTML or hidden machine-readable data.

However, in version 1.6.4 and below, a Stored Cross-Site Scripting (XSS) vulnerability was identified that allows users with Contributor privileges to inject malicious JavaScript via the “Additional CSS class(es)” field in FAQ blocks. This XSS payload is then persistently stored and can be executed when the HTML is rendered, leading to account compromise or further exploitation.

CVE-2025-6572 – OpenStreetMap – Stored XSS to JS Backdoor Creation – POC

CVE-2025-6572 – OpenStreetMap – Stored XSS to JS Backdoor Creation – POC

The OpenStreetMap for Gutenberg and WPBakery Page Builder plugin is designed to help WordPress users easily embed customizable and interactive maps into their posts and pages. However, in version 1.2.0 and below, a Stored Cross-Site Scripting (XSS) vulnerability exists, which allows Contributor-level users to inject persistent JavaScript code into map marker popup text. This can lead to account compromise, content injection, and potentially full site takeover.

CVE-2024-13381 – Calculated Fields Form – Stored XSS to JS Backdoor Creation – POC

CVE-2024-13381 – Calculated Fields Form – Stored XSS to JS Backdoor Creation – POC

Calculated Fields Form is a versatile WordPress plugin that lets users design dynamic forms with live calculations, sliders, and conditional logic. With more than 60,000 active installations, it powers everything from loan calculators to interactive quizzes. However, a severe security flaw—CVE-2024-13381—has been discovered in the plugin’s Slider block configuration. This vulnerability allows an editor to inject persistent JavaScript into form captions, which executes whenever the form is previewed, creating an avenue for backdoor creation and full administrative takeover.

CVE-2025-5921 – Sure Forms – Unauthenticated XSS – POC

CVE-2025-5921 – Sure Forms – Unauthenticated XSS  – POC

Sure Forms is a popular WordPress plugin with over 200,000 active installations, enabling site owners to create custom contact forms, surveys, and interactive interfaces. While robust in features and ease of use, a critical vulnerability—CVE-2025-5921—has been discovered that permits unauthenticated visitors to execute Cross‑Site Scripting (XSS). By crafting a special URL parameter, attackers can embed JavaScript into a public form field, triggering scripts in an administrator’s browser and forging a path to a persistent backdoor or account takeover.

CVE-2024-6130 – Form Maker by 10Web – Stored XSS to JS Backdoor Creation – POC

CVE-2024-6130 – Form Maker by 10Web – Stored XSS to JS Backdoor Creation – POC

Form Maker by 10Web is a popular WordPress plugin that enables site owners to build custom forms with drag-and-drop ease. Boasting over 50,000 active installations, it powers everything from simple contact forms to complex multi-step surveys. Despite its robust feature set, including advanced validation and styling options, the plugin contains a critical security flaw—CVE-2024-6130—that allows an editor to inject malicious JavaScript via the form field “classname” attribute. Once stored, this payload executes whenever the form is rendered, enabling account takeover, backdoor installation, and broader site compromise.

CVE-2025-3581 – Newsletter – Stored XSS to JS Backdoor Creation – POC

CVE-2025-3581 – Newsletter – Stored XSS to JS Backdoor Creation – POC

The Newsletter plugin is a cornerstone of email marketing for WordPress, with over 300,000 active installations. It allows site owners to embed subscription forms via shortcodes and widgets, manage subscriber lists, and send targeted campaigns. Yet, a critical security flaw—CVE-2025-3581—has been discovered within its widget configuration. This vulnerability permits a user with Editor privileges to inject malicious JavaScript into the widget’s Title field. As a result, any visitor or administrator viewing the widget on the frontend will execute the stored script, potentially establishing a persistent backdoor and complete site compromise.

CVE-2025-3582 – Newsletter – Stored XSS to JS Backdoor Creation – POC

CVE-2025-3582 – Newsletter – Stored XSS to JS Backdoor Creation – POC

The Newsletter plugin remains one of the most installed WordPress subscription solutions, with over 300,000 installations powering email campaigns and subscription forms worldwide. Despite its robust feature set—such as drag-and-drop form creation and subscriber management—a severe security flaw has been identified: CVE-2025-3582. This vulnerability allows a user with Editor-level privileges to inject persistent JavaScript into the form configuration itself. Once embedded, the malicious code will execute in any administrator’s or visitor’s browser when they view the affected form, providing attackers with a potent avenue to create backdoors and take over accounts.