<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Read More &amp; Accordion Plugin &lt;= 3.5.7 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/read-more--accordion-plugin--3.5.7/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 02:19:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/read-more--accordion-plugin--3.5.7/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-7467: WordPress Read More &amp; Accordion Plugin Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-7467-wordpress-privesc/</link><pubDate>Wed, 20 May 2026 02:19:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-7467-wordpress-privesc/</guid><description>The Read More &amp; Accordion plugin for WordPress is vulnerable to privilege escalation due to insufficient restrictions on database table writes and data validation during import, allowing authenticated attackers to create administrator accounts.</description><content:encoded><![CDATA[<p>The Read More &amp; Accordion plugin, versions 3.5.7 and earlier, contains a privilege escalation vulnerability (CVE-2026-7467). The vulnerability resides within the <code>RadMoreAjax::importData</code> function. Insufficient input validation and a lack of restrictions on database table writes during the import process allow authenticated attackers with plugin-granted permissions to manipulate critical database tables. By inserting arbitrary rows into the <code>wp_users</code> and <code>wp_usermeta</code> tables, including the <code>wp_capabilities</code> field, attackers can effectively create rogue administrator accounts. This flaw allows them to gain complete administrative control over the affected WordPress site.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site. This access level must have the permission to use the Read More &amp; Accordion plugin&rsquo;s import feature.</li>
<li>The attacker crafts a malicious payload designed to create a new administrator user. This payload includes entries for the <code>wp_users</code> and <code>wp_usermeta</code> tables.</li>
<li>The malicious payload is submitted to the <code>RadMoreAjax::importData</code> function through the plugin&rsquo;s import functionality.</li>
<li>The <code>RadMoreAjax::importData</code> function fails to properly validate the data, allowing the attacker&rsquo;s crafted entries to be processed.</li>
<li>New rows are inserted into the <code>wp_users</code> and <code>wp_usermeta</code> tables, effectively creating a new user account.</li>
<li>The <code>wp_usermeta</code> table is populated with metadata for the new user, including the <code>wp_capabilities</code> field. This field is set to grant the user administrator privileges.</li>
<li>The attacker logs in to the WordPress site using the newly created administrator account.</li>
<li>The attacker now has full control over the compromised WordPress site, including the ability to install plugins, modify themes, and access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7467 allows an attacker to gain complete administrative control over a WordPress website. This can lead to data theft, website defacement, malware distribution, and other malicious activities. The severity is high due to the ease of exploitation for authenticated users and the potential for complete system compromise. The number of potentially affected websites is significant, as the Read More &amp; Accordion plugin is a widely used WordPress plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Read More &amp; Accordion plugin to a version greater than 3.5.7 to patch CVE-2026-7467.</li>
<li>Implement the Sigma rule &ldquo;Detect CVE-2026-7467 Exploitation Attempt via Read More &amp; Accordion Plugin Import&rdquo; to detect attempts to exploit this vulnerability in real-time.</li>
<li>Review user roles and permissions within WordPress to ensure that only trusted users have access to plugin import functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>CVE-2026-7467</category></item></channel></rss>