Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Expanding Access to CVE Data – CVE Program’s CVE List added to VulnCheck Community | Blog

    May 3, 2026

    CVE-2026-7685 | THREATINT

    May 3, 2026

    CVE-2026-7686 | THREATINT

    May 3, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»CVE-2026-7686 | THREATINT
    Alerts

    CVE-2026-7686 | THREATINT

    adminBy adminMay 3, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Home

    Description

    A vulnerability was found in eyeo Adblock Plus up to 4.36.2 on Chrome. Affected by this vulnerability is the function postMessage of the file premium.preload.js of the component Legacy Premium Activation. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. Upgrading the affected component is recommended. The vendor provides additional details: “The affected code path is a legacy Premium activation flow that has been deprecated. eyeo has already migrated to a new user account-based licensing system. The exploit does not grant permanent Premium access. The licensing server issues a short-lived trial license (valid for approximately 24 hours) for any submitted userId. On the next license check, the server validates against a real subscription and the trial expires if no valid subscription is found. The researcher’s claim of permanently unlocking all Premium features is therefore incorrect. (…) The old flow has been present for years and has not been weaponized at scale to our knowledge. The risk to eyeo and to users is minimal.”

    PUBLISHED Reserved 2026-05-02 | Published 2026-05-03 | Updated 2026-05-03 | Assigner VulDB

    MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P

    MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C

    MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C

    5.0AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C

    Problem types

    Improper Access Controls

    Incorrect Privilege Assignment

    Product status

    4.36.0
    affected

    4.36.1
    affected

    4.36.2
    affected

    Timeline

    2026-05-02: Advisory disclosed
    2026-05-02: VulDB entry created
    2026-05-02: VulDB entry last update

    Credits

    DRXYJ (VulDB User) reporter

    VulDB CNA Team coordinator

    References

    vuldb.com/vuln/360856 (VDB-360856 | eyeo Adblock Plus Legacy Premium Activation premium.preload.js postMessage access control) vdb-entry technical-description

    vuldb.com/vuln/360856/cti (VDB-360856 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

    vuldb.com/submit/793551 (Submit #793551 | Eyeo GmbH Adblock Plus 4.36.2 Privilege Escalation) third-party-advisory

    github.com/xryj920/CVE/blob/main/adblock_plus_CVE_report.md exploit

    adblockplus.org/en/download patch

    cve.org (CVE-2026-7686)

    nvd.nist.gov (CVE-2026-7686)

    Download JSON



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCritrical cPanel flaw mass-exploited in “Sorry” ransomware attacks
    Next Article CVE-2026-7685 | THREATINT
    admin
    • Website

    Related Posts

    Alerts

    CVE-2026-7685 | THREATINT

    May 3, 2026
    Alerts

    ZDI-26-155: (Pwn2Own) Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

    May 3, 2026
    Alerts

    ZDI-26-161: GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability

    May 2, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    Expanding Access to CVE Data – CVE Program’s CVE List added to VulnCheck Community | Blog

    May 3, 2026

    CVE-2026-7685 | THREATINT

    May 3, 2026

    CVE-2026-7686 | THREATINT

    May 3, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.