WordPress Read More & Accordion Plugin: Privilege Escalation (CVE-2026-7467)
The Read More & Accordion plugin for WordPress, in versions up to and including 3.5.7, is vulnerable to privilege escalation. The National Vulnerability Database reports that this flaw, tracked as CVE-2026-7467, stems from the RadMoreAjax::importData function failing to restrict database table writes and improperly validating imported data. This is a critical design flaw.
This vulnerability allows authenticated attackers, if granted initial permission via the plugin’s role settings, to inject arbitrary rows into the wp_users and wp_usermeta tables. Specifically, they can manipulate the wp_capabilities field, effectively creating a new administrator account. The result is full administrative access to the compromised WordPress site.
With a CVSS score of 8.8 (High), this isn’t just a theoretical issue. It’s a direct path to total site takeover for an attacker who already has basic access. Defenders need to understand that this isn’t about exploiting a complex buffer overflow; it’s about abusing a poorly implemented import function to bypass WordPress’s core access controls. The attacker’s calculus here is straightforward: gain a low-privilege account, then escalate to admin with minimal effort.
What This Means For You
- If your organization uses WordPress with the Read More & Accordion plugin, immediately identify its version. Any version up to 3.5.7 is vulnerable to CVE-2026-7467. Patch or disable this plugin without delay. Audit your WordPress user logs for any suspicious new administrator accounts or privilege changes, especially if the plugin was enabled.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
WordPress Read More & Accordion Plugin Privilege Escalation - CVE-2026-7467
title: WordPress Read More & Accordion Plugin Privilege Escalation - CVE-2026-7467
id: scw-2026-05-20-ai-1
status: experimental
level: critical
description: |
Detects the specific AJAX action used by the vulnerable Read More & Accordion plugin to import data. This rule specifically looks for the 'radmore_ajax' action being called via 'admin-ajax.php' and indicators of the 'wp_users' and 'wp_usermeta' tables being targeted in the request, which is characteristic of the privilege escalation exploit for CVE-2026-7467.
author: SCW Feed Engine (AI-generated)
date: 2026-05-20
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7467/
tags:
- attack.persistence
- attack.t1078.001
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'action=radmore_ajax'
sc-status:
- '200'
selection_indicators:
referer|contains:
- 'wp_users'
uri|contains:
- 'wp_usermeta'
condition: selection AND selection_indicators
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7467 | Privilege Escalation | WordPress plugin: Read More & Accordion, all versions up to and including 3.5.7 |
| CVE-2026-7467 | Privilege Escalation | Vulnerable function: RadMoreAjax::importData |
| CVE-2026-7467 | Privilege Escalation | Affected database tables: wp_users, wp_usermeta (specifically wp_capabilities field) |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 20, 2026 at 05:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.