CVE-2025-64634

HIGH
2025-12-16 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Dec 16, 2025 - 09:15 nvd
HIGH 8.8

Description

Missing Authorization vulnerability in ThemeFusion Avada avada allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Avada: from n/a through <= 7.13.2.

Analysis

Broken access control in ThemeFusion Avada WordPress theme through version 7.13.2 allows authenticated attackers with low privileges to access functionality improperly constrained by access control lists, potentially achieving full site compromise. With CVSS 8.8 (High) due to network-based access requiring only low-privilege authentication, attackers can achieve high confidentiality, integrity, and availability impact. EPSS probability remains low at 0.06% (18th percentile), and no public exploit identified at time of analysis, suggesting limited immediate exploitation risk despite the critical CVSS rating.

Technical Context

This vulnerability stems from CWE-862 (Missing Authorization), a weakness where the WordPress theme fails to implement proper authorization checks before granting access to sensitive functionality. The Avada theme, one of the most popular premium WordPress themes from theme-fusion, contains functions or endpoints that check whether a user is authenticated but fail to verify whether that authenticated user has appropriate permissions to access specific administrative or privileged features. The CPE identifier cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:* confirms this affects the WordPress implementation of Avada. This class of vulnerability is distinct from authentication bypass-attackers must have valid low-privilege credentials (such as subscriber or contributor accounts) but can then escalate to access restricted administrative functions or data that should require higher privilege levels like editor or administrator roles.

Affected Products

ThemeFusion Avada WordPress theme versions from earliest release through 7.13.2 inclusive are vulnerable, identified by CPE cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*. The vulnerability specifically affects WordPress implementations of this premium theme. Avada is among the highest-selling WordPress themes globally, with hundreds of thousands of active installations, making the potential exposure surface significant despite individual site risk factors. The vulnerability was reported by Patchstack's security audit team ([email protected]), indicating discovery through professional security research rather than active exploitation. Vendor and version-specific guidance available in the Patchstack vulnerability database at https://patchstack.com/database/Wordpress/Theme/avada/vulnerability/wordpress-avada-theme-7-13-1-broken-access-control-vulnerability.

Remediation

Site administrators should immediately upgrade Avada theme to version 7.13.3 or later, which addresses the missing authorization checks. The Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/avada/vulnerability/wordpress-avada-theme-7-13-1-broken-access-control-vulnerability provides detailed vulnerability information and confirms patch availability. As an interim risk reduction measure for sites that cannot immediately upgrade, administrators should review user roles and disable new user registration if not business-critical, audit existing low-privilege user accounts for suspicious activity, and implement Web Application Firewall (WAF) rules to monitor for anomalous authenticated requests to administrative endpoints. However, these are temporary mitigations-upgrading remains the only complete remediation. Given Avada's status as a premium theme with automatic update capabilities, most installations should be able to apply patches through the standard WordPress theme update mechanism once the license is active.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

CVE-2025-64634 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy