Signal
Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-05-14 21:07 UTCUpdated 2026-05-14 23:38 UTC
rss
avada_builder
Trend in the last 24h
Current brief openSource links open
This current signal is open on the public brief with summary, metadata, source links, and full evidence. Pro adds compare-over-time, alerts, exports, and workflow.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.2 top sources shown
limited source diversity in top sources
Overview
The vulnerabilities, disclosed by Wordfence, include an arbitrary file read flaw (CVE-2026-4782) requiring subscriber-level access and a high-severity SQL injection flaw (CVE-2026-4798) exploitable without authentication.
Score total
0.98
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
All evidence
All evidence
Two vulnerabilities found in popular WordPress plugin Avada Builder
SC Media · scworld.com · 2026-05-14 23:38 UTC
Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin
bleepingcomputer_all · bleepingcomputer.com · 2026-05-14 21:07 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
- SC Media (1)
- bleepingcomputer_all (1)
Top origin domains (this list)
- scworld.com (1)
- bleepingcomputer.com (1)