Security researchers warn that the flaws in the Avada Builder plugin could be actively exploited if sites remain unpatched.
The issues, discovered by researcher Rafie Muhammad through the Wordfence Bug Bounty Program, include an arbitrary file read vulnerability (CVE-2026-4782) and a SQL injection flaw (CVE-2026-4798).
These vulnerabilities affect Avada Builder versions up to 3.15.2 and 3.15.1, respectively.
The first flaw (CVE-2026-4782) allows authenticated users with minimal privileges, such as subscribers, to read sensitive files on the server.
This vulnerability exists in the plugin’s handling of the “custom_svg” parameter within a shortcode.
Due to missing validation checks, attackers can manipulate the function responsible for loading files and retrieve contents from arbitrary locations.
This includes critical files like wp-config.php, which contains database credentials and security keys.
In simple terms, a low-level user could trick the plugin into exposing confidential server data without needing admin access.
The issue received a CVSS score of 6.5, indicating medium severity but high practical risk.
The second vulnerability (CVE-2026-4798) is more severe, with a CVSS score of 7.5. It allows unauthenticated attackers to perform time-based SQL injection attacks through the “product_order” parameter.
Because the plugin fails to sanitize database queries properly, attackers can inject malicious SQL commands.
This can be used to extract sensitive data such as user credentials and password hashes from the database.
Although exploitation requires a specific condition, WooCommerce must have been previously installed and later disabled; the attack remains highly impactful.
Threat actors can use timing-based techniques, such as SQL SLEEP functions, to slowly extract information without producing direct output.
The Avada development team released patches in two stages. Version 3.15.2 partially addressed the issues, while the final fix was delivered in version 3.15.3 on May 12, 2026.
Website owners using Avada Builder are strongly advised to update to version 3.15.3 or later immediately.
This incident highlights how even widely trusted plugins can introduce serious security risks if not regularly audited.
With over a million active installations, the attack surface is massive, making such vulnerabilities attractive targets for threat actors.
As attackers continue to automate the exploitation of known flaws, timely patching remains the most effective defense for WordPress site owners.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post 1 Million WordPress Sites Affected by Avada Builder File Read and SQL Injection Flaws appeared first on Cyber Security News.
Fresh from its huge early access launch, underwater survival and crafting adventure game Subnautica 2…
dither-avatar is a lightweight, zero-dependency JavaScript library that generates deterministic, dithered SVG avatars from any…
The cyber battlefield in Eastern Europe is escalating once again. Relentless Russian state-sponsored threat actors…
Three critical vulnerabilities have been disclosed in n8n, the popular open-source workflow automation platform, any…
A critical pre-authentication remote code execution (RCE) vulnerability has been discovered in Marimo, a widely…
A critical heap buffer overflow flaw in F5 NGINX, tracked as CVE-2026-42945, has moved from disclosure…
This website uses cookies.