<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Advanced Database Cleaner – Premium Plugin &lt;= 4.1.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/advanced-database-cleaner--premium-plugin--4.1.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 05:16:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/advanced-database-cleaner--premium-plugin--4.1.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>Advanced Database Cleaner Premium WordPress Plugin Vulnerable to Local File Inclusion (CVE-2026-7522)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-adc-premium-lfi/</link><pubDate>Wed, 20 May 2026 05:16:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-adc-premium-lfi/</guid><description>The Advanced Database Cleaner – Premium plugin for WordPress is vulnerable to Local File Inclusion (LFI) in versions up to 4.1.0, allowing authenticated attackers with subscriber-level access to include and execute arbitrary PHP files on the server via the 'template' parameter, potentially leading to access control bypass, sensitive data access, or code execution.</description><content:encoded><![CDATA[<p>The Advanced Database Cleaner – Premium plugin for WordPress is susceptible to a Local File Inclusion (LFI) vulnerability, identified as CVE-2026-7522. This flaw affects versions up to and including 4.1.0. Authenticated attackers, possessing at least Subscriber-level privileges, can exploit this vulnerability by manipulating the &rsquo;template&rsquo; parameter. This manipulation allows the inclusion and execution of arbitrary PHP files residing on the server. Successful exploitation can lead to bypassing access controls, obtaining sensitive data, or, if the attacker can upload PHP files, achieving arbitrary code execution on the target system. This vulnerability poses a significant risk to WordPress sites using the affected plugin versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains Subscriber-level or higher access to the WordPress instance. This could be through compromised credentials or by registering a new user account.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable &rsquo;template&rsquo; parameter within the Advanced Database Cleaner – Premium plugin.</li>
<li>The crafted request includes a path to a local PHP file that the attacker wants to include and execute. This could be an existing file on the server or a file previously uploaded by the attacker through another vulnerability or misconfiguration.</li>
<li>The WordPress application processes the request and includes the specified PHP file, effectively executing the code within that file.</li>
<li>If the included PHP file contains malicious code, it will be executed with the permissions of the web server user.</li>
<li>The attacker can leverage the executed code to perform various malicious actions, such as reading sensitive files, creating new administrative users, or injecting malicious code into other parts of the WordPress site.</li>
<li>The attacker might establish persistent access by creating a backdoor or modifying existing files to maintain control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this LFI vulnerability could allow attackers to bypass access controls and gain unauthorized access to sensitive information stored on the WordPress server, including database credentials, configuration files, and user data. Furthermore, in scenarios where attackers can upload PHP files, they can achieve arbitrary code execution, potentially leading to complete system compromise. The impact ranges from data theft and defacement to full control of the web server, affecting all sites hosted on the server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a version of the Advanced Database Cleaner – Premium plugin that is not vulnerable to CVE-2026-7522.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2026-7522 Exploitation - Advanced Database Cleaner Premium LFI</code> to identify exploitation attempts targeting the vulnerable &rsquo;template&rsquo; parameter.</li>
<li>Monitor web server logs for suspicious requests containing the &rsquo;template&rsquo; parameter with unusual file paths, which may indicate LFI attempts.</li>
<li>Restrict file upload permissions to prevent unauthorized users from uploading malicious PHP files.</li>
<li>Implement strong password policies and multi-factor authentication to protect WordPress user accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>lfi</category><category>cve-2026-7522</category><category>local-file-inclusion</category></item></channel></rss>