Description
The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusion_map' shortcode in all versions up to, and including, 3.12.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-07-16
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The Avada (Fusion) Builder plugin for WordPress contains a stored cross‑site scripting flaw in the fusion_map shortcode. Insufficient input sanitization and output escaping allow an authenticated user with contributor or higher privileges to inject arbitrary JavaScript into a page. Once injected, the script runs in the context of any visitor to that page, enabling attackers to hijack sessions, deface content, or perform other malicious actions against site users. The weakness is classified as CWE‑79.

Affected Systems

Vulnerable instances are any installation of the Avada (Fusion) Builder plugin up to and including version 3.12.1. Users running older versions should verify their install and consider upgrading.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS score of less than 1% shows a very low likelihood of public exploitation at present, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires authenticated access with at least contributor permissions, making it a local rather than remote vector. However, once the script is stored, any site visitor becomes a target for client‑side attacks.

Generated by OpenCVE AI on April 20, 2026 at 20:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Avada (Fusion) Builder plugin to the latest available version, which removes the fusion_map shortcode vulnerability.
  • If an immediate upgrade is not possible, configure WordPress to prevent contributors and higher roles from editing or inserting the fusion_map shortcode, or temporarily disable the shortcode entirely until a patch is applied.
  • Implement a temporary sanitization layer by wrapping the fusion_map shortcode attributes with esc_attr or a similar WordPress sanitization function to ensure that any user input is properly escaped before rendering.

Generated by OpenCVE AI on April 20, 2026 at 20:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21580 The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusion_map' shortcode in all versions up to, and including, 3.12.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 16 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00029}


Wed, 16 Jul 2025 06:45:00 +0000

Type Values Removed Values Added
Description The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusion_map' shortcode in all versions up to, and including, 3.12.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Avada (Fusion) Builder <= 3.12.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:16.876Z

Reserved: 2025-06-26T18:32:25.551Z

Link: CVE-2025-6747

cve-icon Vulnrichment

Updated: 2025-07-16T13:29:45.962Z

cve-icon NVD

Status : Deferred

Published: 2025-07-16T07:15:24.080

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6747

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T20:30:16Z

Weaknesses