The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Title Avada | Website Builder For WordPress & WooCommerce <= 7.11.4 - Authenticated (Contributor+) Arbitrary File Upload

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Avada
Avada website Builder
CPEs cpe:2.3:a:avada:website_builder:*:*:*:*:*:*:*:*
Vendors & Products Avada
Avada website Builder
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Feb 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Theme-fusion
Theme-fusion avada
Weaknesses CWE-434
CPEs cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*
Vendors & Products Theme-fusion
Theme-fusion avada

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-02-29T03:30:29.778Z

Updated: 2026-04-08T17:24:16.717Z

Reserved: 2024-02-13T15:17:52.189Z

Link: CVE-2024-1468

cve-icon Vulnrichment

Updated: 2024-08-01T18:40:21.187Z

cve-icon NVD

Status : Modified

Published: 2024-02-29T04:15:06.020

Modified: 2026-04-08T19:20:42.773

Link: CVE-2024-1468

cve-icon Redhat

No data.