The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.11.6 via the form_to_url_action function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
References
| Link | Resource |
|---|---|
| https://avada.com/documentation/avada-changelog/ | Release Notes |
| https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc | Exploit Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve | Exploit Third Party Advisory |
| https://avada.com/documentation/avada-changelog/ | Release Notes |
| https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc | Exploit Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-04-09 19:15
Updated : 2025-01-31 02:08
NVD link : CVE-2024-2343
Mitre link : CVE-2024-2343
CVE.ORG link : CVE-2024-2343
JSON object : View
Products Affected
theme-fusion
- avada
CWE
CWE-918
Server-Side Request Forgery (SSRF)
