Vulnerabilities (CVE)

Filtered by vendor Theme-fusion Subscribe
Filtered by product Avada
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39312 1 Theme-fusion 1 Avada 2024-11-21 N/A 9.1 CRITICAL
Missing Authorization vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1.
CVE-2022-41996 1 Theme-fusion 1 Avada 2024-11-21 N/A 8.8 HIGH
Cross-Site Request Forgery (CSRF) vulnerability in ThemeFusion Avada premium theme versions <= 7.8.1 on WordPress leading to arbitrary plugin installation/activation.
CVE-2022-1386 2 Fusion Builder Project, Theme-fusion 2 Fusion Builder, Avada 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
CVE-2020-36711 1 Theme-fusion 1 Avada 2024-11-21 N/A 6.4 MEDIUM
The Avada theme for WordPress is vulnerable to Stored Cross-Site Scripting via the update_layout function in versions up to, and including, 6.2.3 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers, and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2017-18607 1 Theme-fusion 1 Avada 2024-11-21 6.8 MEDIUM 8.8 HIGH
The avada theme before 5.1.5 for WordPress has CSRF.
CVE-2017-18606 1 Theme-fusion 1 Avada 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The avada theme before 5.1.5 for WordPress has stored XSS.
CVE-2024-5628 1 Theme-fusion 1 Avada 2024-09-26 N/A 5.4 MEDIUM
The Avada | Website Builder For WordPress & eCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's fusion_button shortcode in all versions up to, and including, 3.11.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability was partially fixed in 3.11.9. Additional hardening for alternate attack vectors was added to version 3.11.10.