CVE-2026-7522
Description
The Advanced Database Cleaner – Premium plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 4.1.0 via the 'template' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated local file inclusion in Advanced Database Cleaner – Premium plugin via the 'template' parameter (≤4.1.0), allowing arbitrary PHP execution.
Vulnerability
Overview
The Advanced Database Cleaner – Premium plugin for WordPress is vulnerable to Local File Inclusion (LFI) in versions up to and including 4.1.0 [1]. The flaw resides in the insecure handling of the template parameter, which allows authenticated users to include arbitrary PHP files from the server. The plugin, rebuilt in version 4.x with a REST API-driven backend and React interface, introduced this vulnerability in its new codebase [2].
Attack
Vector
An attacker must have a WordPress account with at least Subscriber-level access to exploit this vulnerability [1]. Through the template parameter, the plugin does not properly sanitize or restrict file paths, enabling inclusion of any .php file present on the server's filesystem. No special network position or additional authentication beyond the WordPress session is required.
Impact
Successful exploitation allows the attacker to include and execute arbitrary PHP code residing in files on the server [1]. This can lead to bypassing access controls, reading sensitive data, or achieving full remote code execution if the attacker can also upload a malicious .php file (e.g., through a separate file upload vulnerability or misconfiguration). The CVSS v3 score of 8.8 reflects the high potential for complete compromise of confidentiality, integrity, and availability.
Mitigation
The vendor released version 4.1.1 on May 5, 2026, which addresses this vulnerability [2]. Users are strongly advised to update to the latest version. No workarounds other than upgrading have been documented.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=4.1.0
- Range: <=4.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.