The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.11.6 via the form_to_url_action function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
History

Fri, 10 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title Avada <= 7.11.6 - Authenticated (Contributor+) Server-Side Request Forgery via form_to_url_action

Fri, 31 Jan 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Theme-fusion
Theme-fusion avada
Weaknesses CWE-918
CPEs cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*
Vendors & Products Theme-fusion
Theme-fusion avada

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-04-09T18:59:03.916Z

Updated: 2026-04-08T17:05:09.872Z

Reserved: 2024-03-08T20:51:03.840Z

Link: CVE-2024-2343

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.437Z

cve-icon NVD

Status : Modified

Published: 2024-04-09T19:15:33.033

Modified: 2026-04-08T18:21:04.447

Link: CVE-2024-2343

cve-icon Redhat

No data.