[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-6279":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-21T14:01:49.036Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":385,"aliases":386,"duplicate_of":9,"upstream":387,"downstream":388,"duplicates":389,"related":390,"reserved_at":9,"published_at":391,"modified_at":392,"state":393,"summary":394,"references_raw":401,"kevs":451,"epss":9,"epss_history":452,"metrics":453,"affected":460},"CVE-2026-6279","The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Conditional_Render_Helper::get_value()` passing attacker-controlled values from a base64-decoded JSON blob directly to `call_user_func()` without any allowlist validation. This is exploitable by unauthenticated attackers through the `fusion_get_widget_markup` AJAX endpoint, which is registered for non-privileged (unauthenticated) users via `wp_ajax_nopriv_fusion_get_widget_markup`. The endpoint is protected only by a nonce (`fusion_load_nonce`), but this nonce is generated for user ID 0 and is deterministically exposed in the JavaScript output of any public-facing page containing a Post Cards (`[fusion_post_cards]`) or Table of Contents (`[fusion_table_of_contents]`) element. This makes it possible for unauthenticated attackers to execute arbitrary code on affected sites.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-74","Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.","weakness","Incomplete","Class","High",[20,24,28,32,36,40,224,228,232,236,240,281,285,289,293,297,301,305,309,313,317,321,325,329,333,337,341,345,349,353,357,361,365,369,373,377,381],{"id":21,"name":22,"techniques":23},"CAPEC-10","Buffer Overflow via Environment Variables",[],{"id":25,"name":26,"techniques":27},"CAPEC-101","Server Side Include (SSI) Injection",[],{"id":29,"name":30,"techniques":31},"CAPEC-105","HTTP Request Splitting",[],{"id":33,"name":34,"techniques":35},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-120","Double Encoding",[],{"id":41,"name":42,"techniques":43},"CAPEC-13","Subverting Environment Variable Values",[44,142,184],{"id":45,"name":46,"tactics":47,"countermeasures":54},"T1562.003","Impair Command History Logging",[48,51],{"id":49,"name":50},"TA0030","Defense Evasion",{"id":52,"name":53},"TA0005","Stealth",[55,60,65,69,73,77,82,86,91,96,100,104,109,113,118,122,126,130,134,138],{"id":56,"name":57,"tactic":58},"D3-CI","Configuration Inventory",{"name":59},"Model",{"id":61,"name":62,"tactic":63},"D3-FA","File Analysis",{"name":64},"Detect",{"id":66,"name":67,"tactic":68},"D3-FIM","File Integrity Monitoring",{"name":64},{"id":70,"name":71,"tactic":72},"D3-DA","Dynamic Analysis",{"name":64},{"id":74,"name":75,"tactic":76},"D3-EFA","Emulated File Analysis",{"name":64},{"id":78,"name":79,"tactic":80},"D3-FEV","File Eviction",{"name":81},"Evict",{"id":83,"name":84,"tactic":85},"D3-RKD","Registry Key Deletion",{"name":81},{"id":87,"name":88,"tactic":89},"D3-DF","Decoy File",{"name":90},"Deceive",{"id":92,"name":93,"tactic":94},"D3-DRA","Disable Remote Access",{"name":95},"Harden",{"id":97,"name":98,"tactic":99},"D3-ACH","Application Configuration Hardening",{"name":95},{"id":101,"name":102,"tactic":103},"D3-FE","File Encryption",{"name":95},{"id":105,"name":106,"tactic":107},"D3-RC","Restore Configuration",{"name":108},"Restore",{"id":110,"name":111,"tactic":112},"D3-RF","Restore File",{"name":108},{"id":114,"name":115,"tactic":116},"D3-CQ","Content Quarantine",{"name":117},"Isolate",{"id":119,"name":120,"tactic":121},"D3-CF","Content Filtering",{"name":117},{"id":123,"name":124,"tactic":125},"D3-LFP","Local File Permissions",{"name":117},{"id":127,"name":128,"tactic":129},"D3-RFAM","Remote File Access Mediation",{"name":117},{"id":131,"name":132,"tactic":133},"D3-CM","Content Modification",{"name":117},{"id":135,"name":136,"tactic":137},"D3-EAL","Executable Allowlisting",{"name":117},{"id":139,"name":140,"tactic":141},"D3-EDL","Executable Denylisting",{"name":117},{"id":143,"name":144,"tactics":145,"countermeasures":157},"T1574.006","Dynamic Linker Hijacking",[146,149,152,153,154],{"id":147,"name":148},"TA0110","Persistence",{"id":150,"name":151},"TA0111","Privilege Escalation",{"id":49,"name":50},{"id":52,"name":53},{"id":155,"name":156},"TA0104","Execution",[158,162,164,166,168,170,172,174,176,178,180,182],{"id":159,"name":160,"tactic":161},"D3-SFA","System File Analysis",{"name":64},{"id":61,"name":62,"tactic":163},{"name":64},{"id":66,"name":67,"tactic":165},{"name":64},{"id":78,"name":79,"tactic":167},{"name":81},{"id":87,"name":88,"tactic":169},{"name":90},{"id":101,"name":102,"tactic":171},{"name":95},{"id":110,"name":111,"tactic":173},{"name":108},{"id":119,"name":120,"tactic":175},{"name":117},{"id":123,"name":124,"tactic":177},{"name":117},{"id":127,"name":128,"tactic":179},{"name":117},{"id":114,"name":115,"tactic":181},{"name":117},{"id":131,"name":132,"tactic":183},{"name":117},{"id":185,"name":186,"tactics":187,"countermeasures":193},"T1574.007","Path Interception by PATH Environment Variable",[188,189,190,191,192],{"id":147,"name":148},{"id":150,"name":151},{"id":49,"name":50},{"id":52,"name":53},{"id":155,"name":156},[194,196,198,200,202,204,206,208,210,212,214,216,218,220,222],{"id":61,"name":62,"tactic":195},{"name":64},{"id":66,"name":67,"tactic":197},{"name":64},{"id":70,"name":71,"tactic":199},{"name":64},{"id":74,"name":75,"tactic":201},{"name":64},{"id":78,"name":79,"tactic":203},{"name":81},{"id":87,"name":88,"tactic":205},{"name":90},{"id":101,"name":102,"tactic":207},{"name":95},{"id":110,"name":111,"tactic":209},{"name":108},{"id":119,"name":120,"tactic":211},{"name":117},{"id":123,"name":124,"tactic":213},{"name":117},{"id":127,"name":128,"tactic":215},{"name":117},{"id":114,"name":115,"tactic":217},{"name":117},{"id":131,"name":132,"tactic":219},{"name":117},{"id":135,"name":136,"tactic":221},{"name":117},{"id":139,"name":140,"tactic":223},{"name":117},{"id":225,"name":226,"techniques":227},"CAPEC-135","Format String Injection",[],{"id":229,"name":230,"techniques":231},"CAPEC-14","Client-side Injection-induced Buffer Overflow",[],{"id":233,"name":234,"techniques":235},"CAPEC-24","Filter Failure through Buffer Overflow",[],{"id":237,"name":238,"techniques":239},"CAPEC-250","XML Injection",[],{"id":241,"name":242,"techniques":243},"CAPEC-267","Leverage Alternate Encoding",[244],{"id":245,"name":246,"tactics":247,"countermeasures":250},"T1027","Obfuscated Files or Information",[248,249],{"id":49,"name":50},{"id":52,"name":53},[251,253,255,257,259,261,263,265,267,269,271,273,275,277,279],{"id":61,"name":62,"tactic":252},{"name":64},{"id":66,"name":67,"tactic":254},{"name":64},{"id":70,"name":71,"tactic":256},{"name":64},{"id":74,"name":75,"tactic":258},{"name":64},{"id":78,"name":79,"tactic":260},{"name":81},{"id":87,"name":88,"tactic":262},{"name":90},{"id":101,"name":102,"tactic":264},{"name":95},{"id":110,"name":111,"tactic":266},{"name":108},{"id":119,"name":120,"tactic":268},{"name":117},{"id":123,"name":124,"tactic":270},{"name":117},{"id":127,"name":128,"tactic":272},{"name":117},{"id":114,"name":115,"tactic":274},{"name":117},{"id":131,"name":132,"tactic":276},{"name":117},{"id":135,"name":136,"tactic":278},{"name":117},{"id":139,"name":140,"tactic":280},{"name":117},{"id":282,"name":283,"techniques":284},"CAPEC-273","HTTP Response Smuggling",[],{"id":286,"name":287,"techniques":288},"CAPEC-28","Fuzzing",[],{"id":290,"name":291,"techniques":292},"CAPEC-3","Using Leading 'Ghost' Character Sequences to Bypass Input Filters",[],{"id":294,"name":295,"techniques":296},"CAPEC-34","HTTP Response Splitting",[],{"id":298,"name":299,"techniques":300},"CAPEC-42","MIME Conversion",[],{"id":302,"name":303,"techniques":304},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":306,"name":307,"techniques":308},"CAPEC-45","Buffer Overflow via Symbolic Links",[],{"id":310,"name":311,"techniques":312},"CAPEC-46","Overflow Variables and Tags",[],{"id":314,"name":315,"techniques":316},"CAPEC-47","Buffer Overflow via Parameter Expansion",[],{"id":318,"name":319,"techniques":320},"CAPEC-51","Poison Web Service Registry",[],{"id":322,"name":323,"techniques":324},"CAPEC-52","Embedding NULL Bytes",[],{"id":326,"name":327,"techniques":328},"CAPEC-53","Postfix, Null Terminate, and Backslash",[],{"id":330,"name":331,"techniques":332},"CAPEC-6","Argument Injection",[],{"id":334,"name":335,"techniques":336},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":338,"name":339,"techniques":340},"CAPEC-67","String Format Overflow in syslog()",[],{"id":342,"name":343,"techniques":344},"CAPEC-7","Blind SQL Injection",[],{"id":346,"name":347,"techniques":348},"CAPEC-71","Using Unicode Encoding to Bypass Validation Logic",[],{"id":350,"name":351,"techniques":352},"CAPEC-72","URL Encoding",[],{"id":354,"name":355,"techniques":356},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":358,"name":359,"techniques":360},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":362,"name":363,"techniques":364},"CAPEC-79","Using Slashes in Alternate Encoding",[],{"id":366,"name":367,"techniques":368},"CAPEC-8","Buffer Overflow in an API Call",[],{"id":370,"name":371,"techniques":372},"CAPEC-80","Using UTF-8 Encoding to Bypass Validation Logic",[],{"id":374,"name":375,"techniques":376},"CAPEC-83","XPath Injection",[],{"id":378,"name":379,"techniques":380},"CAPEC-84","XQuery Injection",[],{"id":382,"name":383,"techniques":384},"CAPEC-9","Buffer Overflow in Local Command-Line Utilities",[],[],[],[],[],[],[],"2026-05-21T04:27:57.613Z","2026-05-21T12:23:02.544Z","Received",{"cisa_kev":395,"cisa_ransomware":395,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":396,"severity_score":397,"severity_version":398,"severity_source":399,"severity_vector":400,"severity_status":393},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[402,407,411,415,419,423,427,431,435,439,443,447],{"url":403,"sources":404,"tags":406},"https://www.wordfence.com/threat-intel/vulnerabilities/id/5dc72d78-d47c-4b36-8d69-8672e15ddf8c?source=cve",[399,405],"nvd",[],{"url":408,"sources":409,"tags":410},"https://plugins.trac.wordpress.org/browser/fusion-builder/trunk/inc/helpers/class-fusion-builder-conditional-render-helper.php#L1531",[399,405],[],{"url":412,"sources":413,"tags":414},"https://plugins.trac.wordpress.org/browser/fusion-builder/tags/3.15.0/inc/helpers/class-fusion-builder-conditional-render-helper.php#L1531",[399,405],[],{"url":416,"sources":417,"tags":418},"https://plugins.trac.wordpress.org/browser/fusion-builder/trunk/shortcodes/fusion-widget.php#L44",[399,405],[],{"url":420,"sources":421,"tags":422},"https://plugins.trac.wordpress.org/browser/fusion-builder/tags/3.15.0/shortcodes/fusion-widget.php#L44",[399,405],[],{"url":424,"sources":425,"tags":426},"https://plugins.trac.wordpress.org/browser/fusion-builder/trunk/shortcodes/fusion-widget.php#L389",[399,405],[],{"url":428,"sources":429,"tags":430},"https://plugins.trac.wordpress.org/browser/fusion-builder/tags/3.15.0/shortcodes/fusion-widget.php#L389",[399,405],[],{"url":432,"sources":433,"tags":434},"https://plugins.trac.wordpress.org/browser/fusion-builder/trunk/inc/class-fusion-builder.php#L7551",[399,405],[],{"url":436,"sources":437,"tags":438},"https://plugins.trac.wordpress.org/browser/fusion-builder/tags/3.15.0/inc/class-fusion-builder.php#L7551",[399,405],[],{"url":440,"sources":441,"tags":442},"https://plugins.trac.wordpress.org/browser/fusion-builder/trunk/inc/helpers/class-fusion-builder-conditional-render-helper.php#L1083",[399,405],[],{"url":444,"sources":445,"tags":446},"https://plugins.trac.wordpress.org/browser/fusion-builder/tags/3.15.0/inc/helpers/class-fusion-builder-conditional-render-helper.php#L1083",[399,405],[],{"url":448,"sources":449,"tags":450},"https://avada.com/documentation/avada-changelog/",[399,405],[],[],[],[454,458],{"source":399,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":455,"cvss_v4_0":9},{"baseScore":397,"baseSeverity":456,"vectorString":400,"impactScore":397,"exploitabilityScore":457},"CRITICAL",10,{"source":405,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":459,"cvss_v4_0":9},{"baseScore":397,"baseSeverity":456,"vectorString":400,"impactScore":397,"exploitabilityScore":457},[461],{"ecosystem":9,"name":462,"vendor":463,"product":464,"cpe_part":465,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":466},"Avada (Fusion) Builder","themefusion","avada (fusion) builder","a",[467],{"version":468,"is_range":469,"range_type":399,"version_start":9,"version_start_type":9,"version_end":470,"version_end_type":471,"fixed_in":9},"\u003C= 3.15.2",true,"3.15.2","including"]