CVE-2026-7522: WordPress Advanced Database Cleaner Plugin Vulnerable to LFI
The National Vulnerability Database has issued an advisory for CVE-2026-7522, detailing a Local File Inclusion (LFI) vulnerability in the Advanced Database Cleaner – Premium plugin for WordPress. This flaw, present in versions up to and including 4.1.0, is exploitable via the ‘template’ parameter.
This LFI vulnerability allows authenticated attackers, even those with basic Subscriber-level access, to include and execute arbitrary .php files on the server. The National Vulnerability Database highlights that this can lead to bypassing access controls, exfiltrating sensitive data, or achieving full code execution if the attacker can also upload .php files. The CVSSv3.1 score is a high 8.8.
This isn’t just about reading files; it’s about executing code. Defenders running WordPress instances with this plugin must understand that a low-privilege account can become a full system compromise. The attacker’s calculus here is straightforward: gain a foothold with a basic account, then leverage this LFI to escalate privileges and achieve persistent access. This is a classic path to a full site takeover, and it’s far too common in WordPress environments.
What This Means For You
- If your organization uses the Advanced Database Cleaner – Premium plugin for WordPress, patch immediately to a version greater than 4.1.0. Audit user accounts for any suspicious activity and review server logs for attempts to include or upload .php files, especially from low-privilege users. This vulnerability can be a direct path to code execution and full server compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7522: WordPress Advanced Database Cleaner LFI via 'template' parameter
title: CVE-2026-7522: WordPress Advanced Database Cleaner LFI via 'template' parameter
id: scw-2026-05-20-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7522 by looking for the specific 'template' parameter used in the LFI attack within the WordPress Advanced Database Cleaner plugin. This allows authenticated users with subscriber privileges to include and execute arbitrary PHP files.
author: SCW Feed Engine (AI-generated)
date: 2026-05-20
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7522/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- '?page=adc-premium-settings&template='
cs-method:
- 'GET'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7522 | Local File Inclusion | Advanced Database Cleaner – Premium plugin for WordPress |
| CVE-2026-7522 | Local File Inclusion | Versions up to, and including, 4.1.0 |
| CVE-2026-7522 | Local File Inclusion | Vulnerable parameter: 'template' |
| CVE-2026-7522 | Privilege Escalation | Authenticated attackers with Subscriber-level access and above |
| CVE-2026-7522 | RCE | Include and execute arbitrary .php files |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 20, 2026 at 08:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.