VYPR
Medium severity6.5NVD Advisory· Published Mar 13, 2026· Updated Apr 29, 2026

CVE-2026-32451

CVE-2026-32451

Description

Missing Authorization vulnerability in ThemeFusion Fusion Builder fusion-builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fusion Builder: from n/a through < 3.15.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Fusion Builder plugin for WordPress (versions before 3.15.0) has a missing authorization vulnerability allowing unprivileged attackers to execute higher-privileged actions.

The Fusion Builder plugin for WordPress, developed by ThemeFusion, contains a missing authorization vulnerability in versions prior to 3.15.0. The issue stems from an incorrectly configured access control security level, specifically a Broken Access Control flaw. This means that certain functions in the plugin lack proper authorization checks, nonce token validation, or authentication requirements, potentially allowing unprivileged users to access or execute higher-privileged actions [1].

To exploit this vulnerability, an attacker does not need any special privileges beyond a basic level of access typically available to unauthenticated or low-privilege users on a WordPress site. The vulnerability can be leveraged in mass-exploit campaigns, targeting thousands of websites regardless of their traffic size or popularity [1]. The CVSS v3 score of 6.5 reflects a medium severity due to the low attack complexity and the potential for unauthorized access to sensitive functionality.

Successful exploitation could allow an attacker to perform actions normally reserved for higher-privileged users, such as modifying site content, changing settings, or other administrative operations. This broken access control vulnerability can lead to unauthorized data modification, privilege escalation, or further compromise of the affected WordPress installation [1].

Mitigation is straightforward: the issue has been patched in Fusion Builder version 3.15.0. Site administrators are strongly advised to update to this version or later immediately. For those unable to update, hosting providers or web developers should be consulted for assistance. Patchstack users can enable auto-updates for vulnerable plugins to ensure protection [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

2