The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
References
Link | Resource |
---|---|
https://theme-fusion.com/version-7-6-2-security-update/ | Patch Release Notes Third Party Advisory |
https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b | Exploit Third Party Advisory |
https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/ | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-05-16T14:30:50
Updated: 2022-05-16T14:30:50
Reserved: 2022-04-18T00:00:00
Link: CVE-2022-1386
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-16T15:15:09.310
Modified: 2024-03-14T19:58:30.707
Link: CVE-2022-1386
JSON object: View
Redhat Information
No data.
CWE