VYPR
High severity8.8NVD Advisory· Published May 20, 2026· Updated May 20, 2026

CVE-2026-7522

CVE-2026-7522

Description

The Advanced Database Cleaner – Premium plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 4.1.0 via the 'template' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated local file inclusion in Advanced Database Cleaner – Premium plugin via the 'template' parameter (≤4.1.0), allowing arbitrary PHP execution.

Vulnerability

Overview

The Advanced Database Cleaner – Premium plugin for WordPress is vulnerable to Local File Inclusion (LFI) in versions up to and including 4.1.0 [1]. The flaw resides in the insecure handling of the template parameter, which allows authenticated users to include arbitrary PHP files from the server. The plugin, rebuilt in version 4.x with a REST API-driven backend and React interface, introduced this vulnerability in its new codebase [2].

Attack

Vector

An attacker must have a WordPress account with at least Subscriber-level access to exploit this vulnerability [1]. Through the template parameter, the plugin does not properly sanitize or restrict file paths, enabling inclusion of any .php file present on the server's filesystem. No special network position or additional authentication beyond the WordPress session is required.

Impact

Successful exploitation allows the attacker to include and execute arbitrary PHP code residing in files on the server [1]. This can lead to bypassing access controls, reading sensitive data, or achieving full remote code execution if the attacker can also upload a malicious .php file (e.g., through a separate file upload vulnerability or misconfiguration). The CVSS v3 score of 8.8 reflects the high potential for complete compromise of confidentiality, integrity, and availability.

Mitigation

The vendor released version 4.1.1 on May 5, 2026, which addresses this vulnerability [2]. Users are strongly advised to update to the latest version. No workarounds other than upgrading have been documented.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.