The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.11.6 via the form_to_url_action function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
References
Link | Resource |
---|---|
https://avada.com/documentation/avada-changelog/ | Release Notes |
https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve | Exploit Third Party Advisory |
https://avada.com/documentation/avada-changelog/ | Release Notes |
https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc | Exploit Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve | Exploit Third Party Advisory |
Configurations
History
31 Jan 2025, 02:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Theme-fusion
Theme-fusion avada |
|
References | () https://avada.com/documentation/avada-changelog/ - Release Notes | |
References | () https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve - Exploit, Third Party Advisory | |
CWE | CWE-918 | |
CPE | cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-04-09 19:15
Updated : 2025-01-31 02:08
NVD link : CVE-2024-2343
Mitre link : CVE-2024-2343
CVE.ORG link : CVE-2024-2343
JSON object : View
Products Affected
theme-fusion
- avada
CWE
CWE-918
Server-Side Request Forgery (SSRF)