The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Feb 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Theme-fusion
Theme-fusion avada
Weaknesses CWE-434
CPEs cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*
Vendors & Products Theme-fusion
Theme-fusion avada

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-08T18:59:20.801Z

Reserved: 2024-02-13T15:17:52.189Z

Link: CVE-2024-1468

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.187Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-29T04:15:06.020

Modified: 2025-02-05T18:12:24.317

Link: CVE-2024-1468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.