A vulnerability was found in eyeo Adblock Plus up to 4.36.2 on Chrome. Affected by this vulnerability is the function postMessage of the file premium.preload.js of the component Legacy Premium Activation. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. Upgrading the affected component is recommended. The vendor provides additional details: "The affected code path is a legacy Premium activation flow that has been deprecated. eyeo has already migrated to a new user account-based licensing system. The exploit does not grant permanent Premium access. The licensing server issues a short-lived trial license (valid for approximately 24 hours) for any submitted userId. On the next license check, the server validates against a real subscription and the trial expires if no valid subscription is found. The researcher's claim of permanently unlocking all Premium features is therefore incorrect. (...) The old flow has been present for years and has not been weaponized at scale to our knowledge. The risk to eyeo and to users is minimal."
eyeo Adblock Plus Legacy Premium Activation premium.preload.js postMessage access control
Problem type
Affected products
eyeo
4.36.0 - AFFECTED
4.36.1 - AFFECTED
4.36.2 - AFFECTED
References
https://vuldb.com/vuln/360856
https://vuldb.com/vuln/360856/cti
https://vuldb.com/submit/793551
https://github.com/xryj920/CVE/blob/main/adblock_plus_CVE_report.md
https://adblockplus.org/en/download
GitHub Security Advisories
GHSA-hjhr-m4xv-543v
A vulnerability was found in eyeo Adblock Plus up to 4.36.2 on Chrome. Affected by this...
https://github.com/advisories/GHSA-hjhr-m4xv-543vA vulnerability was found in eyeo Adblock Plus up to 4.36.2 on Chrome. Affected by this vulnerability is the function postMessage of the file premium.preload.js of the component Legacy Premium Activation. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. Upgrading the affected component is recommended. The vendor provides additional details: "The affected code path is a legacy Premium activation flow that has been deprecated. eyeo has already migrated to a new user account-based licensing system. The exploit does not grant permanent Premium access. The licensing server issues a short-lived trial license (valid for approximately 24 hours) for any submitted userId. On the next license check, the server validates against a real subscription and the trial expires if no valid subscription is found. The researcher's claim of permanently unlocking all Premium features is therefore incorrect. (...) The old flow has been present for years and has not been weaponized at scale to our knowledge. The risk to eyeo and to users is minimal."
https://nvd.nist.gov/vuln/detail/CVE-2026-7686
https://adblockplus.org/en/download
https://github.com/xryj920/CVE/blob/main/adblock_plus_CVE_report.md
https://vuldb.com/submit/793551
https://vuldb.com/vuln/360856
https://vuldb.com/vuln/360856/cti
https://github.com/advisories/GHSA-hjhr-m4xv-543v
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7686Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7686",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-05-03T07:30:12.937Z",
"dateReserved": "2026-05-02T16:03:17.517Z",
"datePublished": "2026-05-03T07:30:12.937Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-05-03T07:30:12.937Z"
},
"title": "eyeo Adblock Plus Legacy Premium Activation premium.preload.js postMessage access control",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in eyeo Adblock Plus up to 4.36.2 on Chrome. Affected by this vulnerability is the function postMessage of the file premium.preload.js of the component Legacy Premium Activation. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. Upgrading the affected component is recommended. The vendor provides additional details: \"The affected code path is a legacy Premium activation flow that has been deprecated. eyeo has already migrated to a new user account-based licensing system. The exploit does not grant permanent Premium access. The licensing server issues a short-lived trial license (valid for approximately 24 hours) for any submitted userId. On the next license check, the server validates against a real subscription and the trial expires if no valid subscription is found. The researcher's claim of permanently unlocking all Premium features is therefore incorrect. (...) The old flow has been present for years and has not been weaponized at scale to our knowledge. The risk to eyeo and to users is minimal.\""
}
],
"affected": [
{
"vendor": "eyeo",
"product": "Adblock Plus",
"modules": [
"Legacy Premium Activation"
],
"versions": [
{
"version": "4.36.0",
"status": "affected"
},
{
"version": "4.36.1",
"status": "affected"
},
{
"version": "4.36.2",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Access Controls",
"cweId": "CWE-284",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Incorrect Privilege Assignment",
"cweId": "CWE-266",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/vuln/360856",
"name": "VDB-360856 | eyeo Adblock Plus Legacy Premium Activation premium.preload.js postMessage access control",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/vuln/360856/cti",
"name": "VDB-360856 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/submit/793551",
"name": "Submit #793551 | Eyeo GmbH Adblock Plus 4.36.2 Privilege Escalation",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/xryj920/CVE/blob/main/adblock_plus_CVE_report.md",
"tags": [
"exploit"
]
},
{
"url": "https://adblockplus.org/en/download",
"tags": [
"patch"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C",
"baseScore": 5
}
}
],
"timeline": [
{
"time": "2026-05-02T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-05-02T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-05-02T18:08:37.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "DRXYJ (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "VulDB CNA Team",
"type": "coordinator"
}
]
}
}
}