Description
The Read More & Accordion plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.5.7. This is due to the 'RadMoreAjax::importData' function not restricting which database tables can be written to during import and not properly validating the imported data. This makes it possible for authenticated attackers, with permission granted by the site owner through the plugin's role settings, to insert arbitrary rows into the 'wp_users' and 'wp_usermeta' tables, including the 'wp_capabilities' field, allowing them to create a new administrator account and gain administrator access to the site.
Published: 2026-05-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Read More & Accordion plugin for WordPress contains a flaw in the RadMoreAjax::importData function that fails to restrict which database tables may be written during import. The function also accepts imported data without adequate validation. This vulnerability can be exploited by an authenticated user who has been granted any of the plugin's role permissions to create new rows in the wp_users and wp_usermeta tables, including entries that set the wp_capabilities field. An attacker therefore can add a new administrator account and obtain full control of the site. The weakness is a classic permissions bypass scenario (CWE-269) and provides direct integrity and confidentiality impact for the entire site.

Affected Systems

The issue affects the WordPress plugin "Read More & Accordion" from vendor edmonparker. All releases up to and including version 3.5.7 are vulnerable. No additional vendor products or versions are listed as affected.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability. The EPSS score is not available, but because the exploitation requires legitimate access to the site through the plugin’s role settings, the likelihood of attack is limited to sites where permissions have been granted. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to be authenticated to the WordPress dashboard and have been given at least the plugin‑defined role that allows importing data to conduct this privilege escalation.

Generated by OpenCVE AI on May 20, 2026 at 03:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Read More & Accordion plugin to version 3.5.8 or later, or to the latest available release.
  • Re‑evaluate and remove any unnecessary role permissions granted through the plugin’s role settings, ensuring that only trusted administrators have the ability to use importData.
  • Inspect the wp_users and wp_usermeta tables for unauthorized rows, especially entries where wp_capabilities includes administrator, and delete any suspicious entries.

Generated by OpenCVE AI on May 20, 2026 at 03:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Edmonsoft
Edmonsoft read More & Accordion
Wordpress
Wordpress wordpress
Vendors & Products Edmonsoft
Edmonsoft read More & Accordion
Wordpress
Wordpress wordpress

Wed, 20 May 2026 02:15:00 +0000

Type Values Removed Values Added
Description The Read More & Accordion plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.5.7. This is due to the 'RadMoreAjax::importData' function not restricting which database tables can be written to during import and not properly validating the imported data. This makes it possible for authenticated attackers, with permission granted by the site owner through the plugin's role settings, to insert arbitrary rows into the 'wp_users' and 'wp_usermeta' tables, including the 'wp_capabilities' field, allowing them to create a new administrator account and gain administrator access to the site.
Title Read More & Accordion <= 3.5.7 - Privilege Escalation via importData
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Edmonsoft Read More & Accordion
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-20T15:45:18.473Z

Reserved: 2026-04-29T18:34:05.478Z

Link: CVE-2026-7467

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-20T02:16:39.410

Modified: 2026-05-20T13:54:54.890

Link: CVE-2026-7467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:00:04Z

Weaknesses