Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

One Million WordPress Sites at Risk: Avada Builder Flaws Expose Sensitive Data

Amber | Vulnerability Report
Download PDF
Summary

Two newly disclosed security vulnerabilities in the widely used Avada Builder plugin have placed nearly one million WordPress websites at risk, exposing them to file theft and database compromise. The Avada Builder vulnerabilities, tracked as CVE-2026-4782 and CVE-2026-4798, were first seen on March 21, 2026, and affect WordPress Plugin ThemeFusion Avada Builder versions up to and including 3.15.2. These critical Avada Builder security flaws could allow attackers to access sensitive files such as wp-config.php, steal database credentials, extract password hashes, and potentially take full control of affected WordPress sites.

Security researchers warn that even low-privileged users could abuse the Avada Builder vulnerabilities, while one of the flaws can be exploited without authentication under specific conditions. The Avada Builder arbitrary file read vulnerability and SQL injection flaw present immediate threats to WordPress site security. The issues have been fully patched in Avada Builder version 3.15.3, and website administrators are being urged to update immediately to prevent data exposure and potential site compromise from these Avada Builder vulnerabilities.

Vulnerability Details

Two security flaws in the Avada Builder plugin for WordPress, used on nearly one million websites, could allow attackers to access sensitive server files and extract confidential database information. Avada Builder is a widely used drag-and-drop page builder designed for the Avada theme, enabling users to create and customize website layouts without needing coding knowledge. Researchers warn that the Avada Builder vulnerabilities could expose critical site data and potentially lead to full website compromise if left unpatched.

The first flaw, tracked as CVE-2026-4782, is an authenticated arbitrary file read issue caused by improper path validation in the plugin’s fusion_get_svg_from_file() function. The Avada Builder vulnerability affects versions up to and including 3.15.2 and can be exploited by any authenticated user with Subscriber-level access or higher. Because the Avada Builder plugin fails to properly restrict file paths, attackers can request sensitive files stored on the server, including the highly critical wp-config.php file. Exposure of this file could reveal database credentials, authentication salts, and cryptographic keys, potentially allowing attackers to hijack sessions, create rogue administrator accounts, and maintain persistent access to compromised WordPress websites.

The second issue, CVE-2026-4798, is a high-severity time-based blind SQL injection vulnerability affecting Avada Builder versions up to 3.15.1. The Avada Builder SQL injection flaw exists in the plugin’s post_query() function, where user-controlled input from the product_order parameter is inserted directly into an SQL query without proper sanitization. Although the Avada Builder plugin applies sanitize_text_field(), that protection is ineffective against SQL injection in this context. Under specific conditions, particularly when the WooCommerce plugin had previously been installed and later deactivated, unauthenticated attackers could exploit the Avada Builder vulnerability to slowly extract sensitive database information, including usernames and password hashes, through timing-based queries.

The Avada Builder vulnerabilities were responsibly disclosed to Wordfence in March 2026 and later reported to the Avada Builder developers. A partial fix for the SQL injection flaw was introduced in version 3.15.2 on April 13, 2026, while the fully patched release, version 3.15.3, was issued on May 12, 2026. Website owners and administrators using Avada Builder are strongly advised to upgrade to version 3.15.3 immediately to protect their WordPress sites from potential exploitation of these critical Avada Builder vulnerabilities.

The CVE-2026-4782 vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and affects WordPress ThemeFusion Avada Builder up to and including version 3.15.2. The CVE-2026-4798 vulnerability is classified under CWE-89 (SQL Injection) and affects WordPress ThemeFusion Avada Builder up to and including version 3.15.1. Both Avada Builder vulnerabilities have been patched but are not currently listed in the CISA KEV catalog and are not zero-day vulnerabilities.

Recommendations

All WordPress sites running the Avada theme should update Avada Builder to version 3.15.3 or later without delay. This version contains the complete fix for both Avada Builder vulnerabilities. Because the Avada Builder plugin is bundled with the theme, administrators should ensure their Avada theme license is current to receive the update through the standard WordPress update mechanism. Immediate patching of the Avada Builder vulnerabilities is critical to prevent exploitation and protect WordPress site security.

Any WordPress site that was running a vulnerable version of Avada Builder should treat wp-config.php as potentially compromised. Rotate the database password in your hosting control panel and update the DB_PASSWORD value in wp-config.php to match. Regenerate all eight WordPress authentication keys and salts using the official WordPress salt generator and replace the existing values in wp-config.php. This invalidates any forged sessions that may have been created using leaked cryptographic material from the Avada Builder vulnerabilities.

Review the WordPress user list for any unfamiliar administrator accounts that may have been created through exploitation of the Avada Builder vulnerabilities. Remove any suspicious accounts immediately and reset passwords for all legitimate administrative users. Perform a file integrity check on WordPress core files and the Avada theme directory to identify any unauthorized modifications or planted backdoors that may have been deployed through the Avada Builder security flaws.

If open user registration is enabled on the WordPress site, evaluate whether it is necessary. The Avada Builder arbitrary file read vulnerability requires only Subscriber-level access, making sites with open registration particularly exposed. Disable unnecessary registration or implement approval-based workflows and ensure that default roles are set to the lowest privilege level required. This reduces the attack surface for the Avada Builder vulnerabilities by limiting who can potentially exploit the authenticated arbitrary file read flaw.

MITRE ATT&CK TTPs

The Avada Builder vulnerabilities can be exploited using several MITRE ATT&CK tactics and techniques. Under Initial Access, attackers leverage Exploit Public-Facing Application (T1190) to target the publicly accessible Avada Builder plugin vulnerabilities in WordPress installations. For Credential Access, adversaries exploit Unsecured Credentials (T1552), specifically Credentials In Files (T1552.001), by using the Avada Builder arbitrary file read vulnerability to access wp-config.php and extract database credentials and authentication salts.

The Collection tactic involves Data from Local System (T1005), where attackers use the Avada Builder vulnerabilities to gather sensitive information from the compromised WordPress server, including database contents and configuration files. Under Resource Development, adversaries employ Obtain Capabilities (T1588), specifically Vulnerabilities (T1588.006), by acquiring or developing exploits for the Avada Builder security flaws to target WordPress websites at scale.

References

https://www.wordfence.com/blog/2026/05/1000000-wordpress-sites-affected-by-arbitrary-file-read-and-sql-injection-vulnerabilities-in-avada-builder-wordpress-plugin/

https://themeforest.net/item/avada-responsive-multipurpose-theme/2833226

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox