Impact
The Avada (Fusion) Builder plugin exposes a stored XSS flaw in several shortcodes due to missing input sanitization and output escaping. Authenticated attackers with contributor or higher privileges can inject arbitrary JavaScript that will execute whenever an affected page is viewed. The injected script can steal session cookies, deface content, or perform other client‑side attacks on site visitors.
Affected Systems
Any WordPress site using the ThemeFusion Avada (Fusion) Builder plugin through version 3.11.14. The vulnerability affects all builds of the plugin included in that range.
Risk and Exploitability
The overall CVSS score of 6.4 indicates moderate severity, while the EPSS score of less than 1 % signals a low likelihood of public exploitation. The vulnerability remains outside the CISA KEV catalog. Exploitation requires an authenticated WordPress account with contributor or higher permission, making it a local privilege issue rather than a remote network exploit. Nevertheless, once a page is viewed by a user, the injected script runs in that user’s browser and can compromise the session or data for that user.
OpenCVE Enrichment
EUVD