CVE-2025-6747
Description
The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusion_map' shortcode in all versions up to, and including, 3.12.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS vulnerability in the Avada Builder WordPress plugin's fusion_map shortcode allows authenticated contributors to inject arbitrary scripts.
Vulnerability
Description
The Avada (Fusion) Builder plugin for WordPress, in versions up to and including 3.12.1, contains a stored cross-site scripting (XSS) vulnerability in the fusion_map shortcode. The root cause is insufficient input sanitization and output escaping on user-supplied attributes, allowing malicious HTML/JavaScript to be stored on the server. [1]
Exploitation
Prerequisites
An attacker must have an authenticated WordPress account with at least contributor-level access. The attacker then crafts a post or page containing the vulnerable fusion_map shortcode with specially crafted attribute values. The injected script is stored and executed in the browsers of any users who view the compromised page. No additional privileges or social engineering is required beyond the initial authentication. [1]
Impact
Successful exploitation allows the attacker to inject arbitrary web scripts (JavaScript, HTML) that execute in the context of the victim's session. This can lead to session hijacking, defacement, redirection to malicious sites, or theft of sensitive data such as cookies and authentication tokens. The XSS is stored, meaning it persists across visits and can affect multiple users without repeated attacker interaction. [1]
Mitigation
The vulnerability is patched in Avada (Fusion) Builder versions after 3.12.1. Users should update the plugin to the latest version available. As of May 2026, the latest Avada core version is 7.15.3, and the Builder component is updated accordingly. No workarounds have been disclosed. Administrators should also review contributor-level user permissions and consider security plugins that add additional input validation. [1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.12.1
- Range: <=3.12.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.