CVE-2026-6279 - Avada Builder Plugin Unauthenticated RCE via PHP Function Injection
The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to unauthenticated remote code execution (RCE) due to PHP function injection, allowing attackers to execute arbitrary code on affected sites.
The Avada Builder (fusion-builder) plugin for WordPress, specifically versions up to and including 3.15.2, contains an unauthenticated remote code execution vulnerability, tracked as CVE-2026-6279. The vulnerability stems from a lack of proper validation when handling the wp_conditional_tags case within the Fusion_Builder_Conditional_Render_Helper::get_value() function. This allows attacker-controlled values from a base64-decoded JSON blob to be passed directly to call_user_func(), resulting in PHP function injection. The fusion_get_widget_markup AJAX endpoint, accessible to unauthenticated users via wp_ajax_nopriv_fusion_get_widget_markup, can be exploited. Although a nonce (fusion_load_nonce) is present, it is generated for user ID 0 and deterministically exposed in the JavaScript output of public-facing pages containing a Post Cards ([fusion_post_cards]) or Table of Contents ([fusion_table_of_contents]) element, bypassing the intended authentication mechanism.
Attack Chain
- The attacker identifies a WordPress site running a vulnerable version of the Avada Builder plugin (<= 3.15.2).
- The attacker visits a public-facing page containing either a Post Cards (
[fusion_post_cards]) or Table of Contents ([fusion_table_of_contents]) element. - The attacker extracts the
fusion_load_noncevalue from the page’s JavaScript source code. - The attacker crafts a malicious AJAX request to the
fusion_get_widget_markupendpoint, including the extractedfusion_load_noncevalue. - The attacker injects a PHP function call within the base64-decoded JSON blob passed to
Fusion_Builder_Conditional_Render_Helper::get_value()via thewp_conditional_tagscase. - The
call_user_func()function executes the attacker-controlled PHP function. - The attacker executes arbitrary code on the WordPress server.
- The attacker achieves full control of the WordPress site.
Impact
Successful exploitation of CVE-2026-6279 allows unauthenticated attackers to execute arbitrary code on vulnerable WordPress sites. This can lead to complete compromise of the affected website, including data theft, defacement, malware injection, and denial of service. Given the popularity of the Avada Builder plugin, a large number of WordPress sites are potentially at risk.
Recommendation
- Upgrade the Avada Builder plugin to a version greater than 3.15.2 to patch CVE-2026-6279.
- Deploy the Sigma rule
Detect Avada Builder PHP Function Injection Attemptto identify exploitation attempts against thefusion_get_widget_markupendpoint. - Monitor web server logs for POST requests to
/wp-admin/admin-ajax.phpwithaction=fusion_get_widget_markupcontaining suspicious base64 encoded data, as detected byDetect Avada Builder fusion_get_widget_markup Endpoint Access.
Detection coverage 2
Detect Avada Builder PHP Function Injection Attempt
criticalDetects CVE-2026-6279 exploitation — attempts to inject PHP functions via the fusion_get_widget_markup endpoint.
Detect Avada Builder fusion_get_widget_markup Endpoint Access
mediumDetects access to the fusion_get_widget_markup AJAX endpoint, potentially indicating CVE-2026-6279 exploitation attempts.
Detection queries are available on the platform. Get full rules →