Introduction
If you run a WordPress site with the Avada Builder plugin installed (used by over one million sites), recent security research has revealed two critical flaws that could allow attackers to read arbitrary files and extract sensitive database information. These vulnerabilities—an arbitrary file read and a database information disclosure—could lead to credential theft, exposing login details, API keys, and other secrets. This guide walks you through the essential steps to protect your site, from checking your plugin version to implementing long-term security measures.

What You Need
- Administrator access to your WordPress dashboard
- FTP or cPanel access (optional, for manual updates)
- A recent backup of your site (recommended)
- A security plugin (e.g., Wordfence, Sucuri) for monitoring
- Basic familiarity with WordPress settings and file permissions
Step-by-Step Protection Guide
Step 1: Identify Your Current Avada Builder Version
First, log into your WordPress admin panel and navigate to Plugins > Installed Plugins. Locate Avada Builder in the list. Note the version number displayed—if it is below 3.11.11, your site is vulnerable. The flaws affect versions prior to that release, so any older version puts your credentials at risk.
Step 2: Update Avada Builder Immediately
If your version is outdated, click the Update Now link under the plugin name. The vendor (ThemeFusion) released a patched version (3.11.11) that fixes both the arbitrary file read and the database information disclosure issues. If automatic updates fail, download the latest version from your ThemeFusion account and upload it via Plugins > Add New > Upload Plugin.
Step 3: Check for Unauthorized Changes
After updating, scan your site for any signs of compromise. Use a security plugin to run a full file integrity check. Look for unexpected admin users, modified files in the wp-content/plugins/avada-builder/ directory, or suspicious entries in your access logs. The file read vulnerability could have been used to steal wp-config.php contents, so verify that your database credentials remain secure.
Step 4: Restrict File Permissions
Prevent future exploitation by tightening file permissions on sensitive files. Using an FTP client or cPanel File Manager, set wp-config.php to 600 (read/write only for the owner) and the entire wp-content directory to 755 or 750. This limits what even a vulnerable plugin can read.
Step 5: Implement a Web Application Firewall (WAF)
A WAF can block malicious requests targeting plugin vulnerabilities. Services like Cloudflare (free plan), Sucuri, or Wordfence offer rulesets that detect and block arbitrary file read attempts. Configure the WAF to log attacks—this gives you early warning if someone tries to exploit the Avada Builder flaws.
Step 6: Rotate All Credentials
Assuming the worst—that your database credentials may have been exposed—change your WordPress database user password, all admin passwords, and any API keys stored in your site. Use strong, unique passwords generated by a password manager. If the attacker gained access, they could have extracted hashed passwords; rotating them minimizes window of opportunity.

Step 7: Enable Two-Factor Authentication (2FA)
Add an extra layer of defense for admin accounts. Install a 2FA plugin (e.g., Google Authenticator, Duo) and enforce it for all users with elevated privileges. Even if an attacker steals credential hashes, they won’t be able to log in without the second factor.
Step 8: Monitor for Future Updates
Subscribe to the Avada Builder changelog or security mailing list. The vulnerabilities were disclosed through the WordPress plugin repository and security blogs; staying informed helps you patch within hours of a release. Enable automatic updates for plugins (or at least for Avada Builder) to reduce manual lag.
For in-depth guidance on hardening your WordPress installation, check our guide on basic WordPress security hardening.
Conclusion and Final Tips
- Backup regularly: Even with all precautions, a zero-day can slip through. Automated daily backups stored off-site ensure you can restore quickly.
- Use a staging environment: Test plugin updates on a staging copy before applying them to your live site—this prevents conflicts that might force you to delay a critical security patch.
- Limit plugin usage: Each plugin is a potential attack surface. Remove any that are not actively maintained or that duplicate functionality.
- Review file read logs: If your server logs requests to
wp-config.phporreadme.txtwith unusual parameters, investigate immediately—these are common targets for file read exploits. - Educate your team: Ensure all users with admin access follow the same security protocols. A single weak password can undo all the technical protections.
By following these steps, you dramatically reduce the risk posed by the Avada Builder vulnerabilities and protect your site credentials from theft. Stay vigilant and keep everything updated.