<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Function-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/function-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 05:16:53 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/function-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-6279 - Avada Builder Plugin Unauthenticated RCE via PHP Function Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-avada-builder-rce/</link><pubDate>Thu, 21 May 2026 05:16:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-avada-builder-rce/</guid><description>The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to unauthenticated remote code execution (RCE) due to PHP function injection, allowing attackers to execute arbitrary code on affected sites.</description><content:encoded><![CDATA[<p>The Avada Builder (fusion-builder) plugin for WordPress, specifically versions up to and including 3.15.2, contains an unauthenticated remote code execution vulnerability, tracked as CVE-2026-6279. The vulnerability stems from a lack of proper validation when handling the <code>wp_conditional_tags</code> case within the <code>Fusion_Builder_Conditional_Render_Helper::get_value()</code> function. This allows attacker-controlled values from a base64-decoded JSON blob to be passed directly to <code>call_user_func()</code>, resulting in PHP function injection. The <code>fusion_get_widget_markup</code> AJAX endpoint, accessible to unauthenticated users via <code>wp_ajax_nopriv_fusion_get_widget_markup</code>, can be exploited. Although a nonce (<code>fusion_load_nonce</code>) is present, it is generated for user ID 0 and deterministically exposed in the JavaScript output of public-facing pages containing a Post Cards (<code>[fusion_post_cards]</code>) or Table of Contents (<code>[fusion_table_of_contents]</code>) element, bypassing the intended authentication mechanism.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site running a vulnerable version of the Avada Builder plugin (&lt;= 3.15.2).</li>
<li>The attacker visits a public-facing page containing either a Post Cards (<code>[fusion_post_cards]</code>) or Table of Contents (<code>[fusion_table_of_contents]</code>) element.</li>
<li>The attacker extracts the <code>fusion_load_nonce</code> value from the page&rsquo;s JavaScript source code.</li>
<li>The attacker crafts a malicious AJAX request to the <code>fusion_get_widget_markup</code> endpoint, including the extracted <code>fusion_load_nonce</code> value.</li>
<li>The attacker injects a PHP function call within the base64-decoded JSON blob passed to <code>Fusion_Builder_Conditional_Render_Helper::get_value()</code> via the <code>wp_conditional_tags</code> case.</li>
<li>The <code>call_user_func()</code> function executes the attacker-controlled PHP function.</li>
<li>The attacker executes arbitrary code on the WordPress server.</li>
<li>The attacker achieves full control of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6279 allows unauthenticated attackers to execute arbitrary code on vulnerable WordPress sites. This can lead to complete compromise of the affected website, including data theft, defacement, malware injection, and denial of service. Given the popularity of the Avada Builder plugin, a large number of WordPress sites are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Avada Builder plugin to a version greater than 3.15.2 to patch CVE-2026-6279.</li>
<li>Deploy the Sigma rule <code>Detect Avada Builder PHP Function Injection Attempt</code> to identify exploitation attempts against the <code>fusion_get_widget_markup</code> endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with <code>action=fusion_get_widget_markup</code> containing suspicious base64 encoded data, as detected by <code>Detect Avada Builder fusion_get_widget_markup Endpoint Access</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>rce</category><category>php</category><category>function-injection</category><category>cve-2026-6279</category></item></channel></rss>