Categories: Cyber Security News

1 Million WordPress Sites Affected by Avada Builder File Read and SQL Injection Flaws

A widely used WordPress plugin powering over one million websites has been hit by two serious vulnerabilities that could allow attackers to steal sensitive data and access server files.

Security researchers warn that the flaws in the Avada Builder plugin could be actively exploited if sites remain unpatched.

The issues, discovered by researcher Rafie Muhammad through the Wordfence Bug Bounty Program, include an arbitrary file read vulnerability (CVE-2026-4782) and a SQL injection flaw (CVE-2026-4798).

These vulnerabilities affect Avada Builder versions up to 3.15.2 and 3.15.1, respectively.

Avada Builder Flaws

Arbitrary File Read Vulnerability

The first flaw (CVE-2026-4782) allows authenticated users with minimal privileges, such as subscribers, to read sensitive files on the server.

This vulnerability exists in the plugin’s handling of the “custom_svg” parameter within a shortcode.

Due to missing validation checks, attackers can manipulate the function responsible for loading files and retrieve contents from arbitrary locations.

This includes critical files like wp-config.php, which contains database credentials and security keys.

In simple terms, a low-level user could trick the plugin into exposing confidential server data without needing admin access.

The issue received a CVSS score of 6.5, indicating medium severity but high practical risk.

SQL Injection Enables Data Theft

The second vulnerability (CVE-2026-4798) is more severe, with a CVSS score of 7.5. It allows unauthenticated attackers to perform time-based SQL injection attacks through the “product_order” parameter.

Because the plugin fails to sanitize database queries properly, attackers can inject malicious SQL commands.

This can be used to extract sensitive data such as user credentials and password hashes from the database.

Although exploitation requires a specific condition, WooCommerce must have been previously installed and later disabled; the attack remains highly impactful.

Threat actors can use timing-based techniques, such as SQL SLEEP functions, to slowly extract information without producing direct output.

The Avada development team released patches in two stages. Version 3.15.2 partially addressed the issues, while the final fix was delivered in version 3.15.3 on May 12, 2026.

Website owners using Avada Builder are strongly advised to update to version 3.15.3 or later immediately.

  • Update the plugin to the latest version.
  • Review user roles and remove unnecessary subscriber accounts.
  • Monitor logs for unusual database queries or file access.
  • Use a web application firewall, such as Wordfence, for added protection.

This incident highlights how even widely trusted plugins can introduce serious security risks if not regularly audited.

With over a million active installations, the attack surface is massive, making such vulnerabilities attractive targets for threat actors.

As attackers continue to automate the exploitation of known flaws, timely patching remains the most effective defense for WordPress site owners.

Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post 1 Million WordPress Sites Affected by Avada Builder File Read and SQL Injection Flaws appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Subnautica 2 Dev Gives Players Hope Amid the Game’s First Hot Topic Following Launch

Fresh from its huge early access launch, underwater survival and crafting adventure game Subnautica 2…

16 minutes ago

Seed-Based Dithered SVG Avatar Generator for JS & React – dither-avatar

dither-avatar is a lightweight, zero-dependency JavaScript library that generates deterministic, dithered SVG avatars from any…

21 minutes ago

Gamaredon Deploys GammaDrop and GammaLoad In Phishing Campaigns

The cyber battlefield in Eastern Europe is escalating once again. Relentless Russian state-sponsored threat actors…

29 minutes ago

Critical n8n Flaw Expose Automation Nodes to Full RCE

Three critical vulnerabilities have been disclosed in n8n, the popular open-source workflow automation platform, any…

29 minutes ago

Marimo Security Flaw Enables remote code execution Attacks

A critical pre-authentication remote code execution (RCE) vulnerability has been discovered in Marimo, a widely…

29 minutes ago

Hackers Exploit Critical NGINX RCE Vulnerability in the Wild

A critical heap buffer overflow flaw in F5 NGINX, tracked as CVE-2026-42945, has moved from disclosure…

29 minutes ago

This website uses cookies.