Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Home/CyberSecurity News/Avada Builder Flaws Affect 1 Million WordPress Sites with
CyberSecurity News

Avada Builder Flaws Affect 1 Million WordPress Sites with

Two serious vulnerabilities have been discovered in a widely used WordPress plugin, affecting over one million websites. These flaws could allow attackers to steal sensitive data and access server...

Sarah simpson
Sarah simpson
May 18, 2026 2 Min Read
2 0

Two serious vulnerabilities have been discovered in a widely used WordPress plugin, affecting over one million websites. These flaws could allow attackers to steal sensitive data and access server files.

Table Of Content

  • Avada Builder Flaws
  • Arbitrary File Read Vulnerability
  • SQL Injection Enables Data Theft

Security researchers warn that the flaws in the Avada Builder plugin could be actively exploited if sites remain unpatched.

The issues, discovered by researcher Rafie Muhammad through the Wordfence Bug Bounty Program, include an arbitrary file read vulnerability (CVE-2026-4782) and a SQL injection flaw (CVE-2026-4798).

These vulnerabilities affect Avada Builder versions up to 3.15.2 and 3.15.1, respectively.

Avada Builder Flaws

Arbitrary File Read Vulnerability

The first flaw (CVE-2026-4782) allows authenticated users with minimal privileges, such as subscribers, to read sensitive files on the server.

This vulnerability exists in the plugin’s handling of the “custom_svg” parameter within a shortcode.

Due to missing validation checks, attackers can manipulate the function responsible for loading files and retrieve contents from arbitrary locations.

This includes critical files like wp-config.php, which contains database credentials and security keys.

In simple terms, a low-level user could trick the plugin into exposing confidential server data without needing admin access.

The issue received a CVSS score of 6.5, indicating medium severity but high practical risk.

SQL Injection Enables Data Theft

The second vulnerability (CVE-2026-4798) is more severe, with a CVSS score of 7.5. It allows unauthenticated attackers to perform time-based SQL injection attacks through the “product_order” parameter.

Because the plugin fails to sanitize database queries properly, attackers can inject malicious SQL commands.

This can be used to extract sensitive data such as user credentials and password hashes from the database.

Although exploitation requires a specific condition, WooCommerce must have been previously installed and later disabled; the attack remains highly impactful.

Threat actors can use timing-based techniques, such as SQL SLEEP functions, to slowly extract information without producing direct output.

The Avada development team released patches in two stages. Version 3.15.2 partially addressed the issues, while the final fix was delivered in version 3.15.3 on May 12, 2026.

Website owners using Avada Builder are strongly advised to update to version 3.15.3 or later immediately.

  • Update the plugin to the latest version.
  • Review user roles and remove unnecessary subscriber accounts.
  • Monitor logs for unusual database queries or file access.
  • Use a web application firewall, such as Wordfence, for added protection.

This incident highlights how even widely trusted plugins can introduce serious security risks if not regularly audited.

With over a million active installations, the attack surface is massive, making such vulnerabilities attractive targets for threat actors.

As attackers continue to automate the exploitation of known flaws, timely patching remains the most effective defense for WordPress site owners.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922

Next Post

CISA Warns: Microsoft Exchange Vulnerability Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Claude Code RCE Flaw: Execute Commands Lets Attackers
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us