VYPR
Medium severity6.5NVD Advisory· Published Mar 13, 2026· Updated Apr 22, 2026

CVE-2026-32454

CVE-2026-32454

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeFusion Avada Core fusion-core allows DOM-Based XSS.This issue affects Avada Core: from n/a through < 5.15.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-based XSS in Avada Core plugin for WordPress allows attackers to inject malicious scripts via crafted input, requiring user interaction.

Vulnerability

Overview

The vulnerability is a DOM-based Cross-Site Scripting (XSS) in the ThemeFusion Avada Core (fusion-core) plugin for WordPress. It stems from improper neutralization of input during web page generation, allowing an attacker to inject arbitrary scripts into the DOM of a victim's browser. The issue affects all versions of the plugin prior to 5.15.0 [1].

Exploitation

Details

Exploitation requires a privileged user (e.g., an administrator) to perform an action such as clicking a malicious link, visiting a crafted page, or submitting a specially crafted form. The attacker does not need direct access to the site but must trick a privileged user into triggering the payload. This type of vulnerability is often used in mass-exploit campaigns targeting thousands of WordPress sites regardless of their size or popularity [1].

Impact

Successful exploitation allows the attacker to inject malicious scripts, redirects, advertisements, or other HTML payloads into the website. These scripts execute in the context of the victim's browser when they visit the affected site, potentially leading to session hijacking, defacement, or further compromise of the site and its users [1].

Mitigation

The vulnerability has been patched in version 5.15.0 of the Avada Core plugin. Users are strongly advised to update to this version or later. Patchstack users can enable auto-updates for vulnerable plugins. Although the severity is rated as medium (CVSS 6.5) and the vendor considers it low risk, updating is recommended to prevent potential exploitation [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.